操作系统选择题库答案及详解

合集下载

计算机操作系统考试题目及答案

计算机操作系统考试题目及答案

计算机操作系统考试题目及答案一、选择题(每题2分,共20分)1. 计算机操作系统的主要功能是()A. 资源管理B. 程序控制C. 用户接口D. 以上都是答案:D2. 在操作系统中,进程和线程的主要区别是()A. 进程是资源分配的基本单位,线程是任务执行的基本单位B. 进程是任务执行的基本单位,线程是资源分配的基本单位C. 进程和线程没有区别D. 以上都不对答案:A3. 操作系统的五大特性包括:处理器管理、存储管理、设备管理、文件管理和()A. 用户接口B. 网络管理C. 图形界面管理D. 以上都是答案:D4. 下列关于操作系统的描述,错误的是()A. 操作系统是计算机系统的核心软件B. 操作系统负责管理计算机硬件和软件资源C. 操作系统提供用户与计算机之间的接口D. 操作系统可以运行在各种计算机硬件平台上答案:D5. 下列哪种调度算法是抢占式调度?()A. 先来先服务(FCFS)B. 最短作业优先(SJF)C. 轮转调度(Round Robin)D. 最高响应比优先(HRRN)答案:C二、填空题(每题2分,共20分)1. 操作系统的目标是______、______、______和______计算机资源。

答案:合理分配、高效利用、方便用户、确保安全2. 进程可以分为______进程和______进程。

答案:前台、后台3. 分页存储管理中,______是指内存中的一块连续的存储区域。

答案:页4. 在______调度算法中,操作系统会根据进程的优先级来决定下一个要执行的进程。

答案:优先级5. 文件系统的主要功能包括:______、______、______和______。

答案:文件存储、文件检索、文件修改、文件保护三、简答题(每题10分,共30分)1. 请简要介绍操作系统的五大特性。

答案:操作系统的五大特性包括:处理器管理、存储管理、设备管理、文件管理和用户接口。

处理器管理负责处理器的分配和调度;存储管理负责内存资源的分配和回收,以及内存的扩充技术;设备管理负责管理计算机硬件设备,包括输入输出设备的分配和回收,以及设备驱动程序的管理;文件管理负责文件的存储、检索、修改和保护,以及文件系统的维护;用户接口提供用户与计算机之间的交互,包括命令行接口和图形用户接口。

自考操作系统试题及答案

自考操作系统试题及答案

自考操作系统试题及答案一、单项选择题(每题1分,共10分)1. 在操作系统中,进程和程序的主要区别是()。

A. 程序是静态的,进程是动态的B. 程序是动态的,进程是静态的C. 程序和进程没有区别D. 程序是操作系统,进程是用户程序答案:A2. 下列关于操作系统的描述,不正确的是()。

A. 操作系统是计算机系统中最基本的系统软件B. 操作系统是用户与计算机硬件之间的接口C. 操作系统是计算机系统中的通用软件D. 操作系统是计算机系统中的应用软件答案:D3. 在分时系统中,CPU调度算法的主要目标是()。

A. 保证系统资源的合理分配B. 提高CPU的利用率C. 保证系统资源的高效利用D. 以上都是答案:D4. 下列关于虚拟内存的描述,正确的是()。

A. 虚拟内存是实际存在的物理内存B. 虚拟内存是操作系统提供的一种内存管理技术C. 虚拟内存的大小与物理内存无关D. 虚拟内存可以无限大答案:B5. 进程通信中,管道是一种()。

A. 同步通信方式B. 异步通信方式C. 单向通信方式D. 双向通信方式答案:C6. 在操作系统中,文件系统的主要作用是()。

A. 实现文件的存储B. 实现文件的共享C. 实现文件的保护D. 以上都是答案:D7. 下列关于死锁的描述,不正确的是()。

A. 死锁是指两个或多个进程在执行过程中,因争夺资源而造成的一种僵局B. 死锁会导致系统资源的浪费C. 死锁是操作系统设计不当的结果D. 死锁是不可避免的答案:D8. 下列关于操作系统的层次结构,正确的是()。

A. 应用层、系统调用层、硬件层B. 硬件层、系统调用层、应用层C. 应用层、系统调用层、硬件层、文件系统层D. 系统调用层、文件系统层、硬件层答案:B9. 在操作系统中,中断处理程序的作用是()。

A. 处理用户请求B. 处理系统调用C. 处理硬件中断D. 处理软件中断答案:C10. 下列关于操作系统的描述,正确的是()。

A. 操作系统是计算机系统中的硬件B. 操作系统是计算机系统中的软件C. 操作系统是计算机系统中的外设D. 操作系统是计算机系统中的网络答案:B二、多项选择题(每题2分,共10分)1. 操作系统的主要功能包括()。

操作系统概论考试题含参考答案

操作系统概论考试题含参考答案

操作系统概论考试题含参考答案一、单选题(共90题,每题1分,共90分)1、将一个进程的逻辑地址空间分成若干个大小相等的片,称为A、页表B、页框C、页D、页内碎片正确答案:C2、【】的优点是空闲区分布均匀、查找开销较小。

A、循环首次适应算法B、首次适应算法C、最快适应算法D、最佳适应算法正确答案:A3、操作系统内核的资源管理功能不包括A、设备管理B、进程管理C、存储器管理D、时钟管理正确答案:D4、自调度算法的缺点不包括A、瓶颈问题B、低效性C、线程切换频繁D、不利于提高CPU的利用率正确答案:D5、现代操作系统的特征不包括A、并发B、共享C、虚拟D、同步性正确答案:D6、【】是用于管理文件的系统文件。

A、目录文件B、字符设备文件C、正规文件D、块设备文件正确答案:A7、下列关于静态优先权的说法中,错误的是A、静态优先权调度算法可以使系统获得更好的调度性能B、静态优先权在创建时确定C、静态优先权值通常可以根据进程的类型、进程需要的资源数量和户的要求来设定D、静态优先权在进程的整个运行期间保持不变正确答案:A8、进程的基本状态不包括A、完成态B、就绪态C、执行态D、阻塞态正确答案:A9、下列关于进程的说法中,错误的是A、进程是由正文段和进程控制块共同组成的执行环境B、进程是允许并发执行的程序在某个数据集合上的运行过程C、正文段存放被执行的机器指令D、进程控制块存放程序的运行环境正确答案:A10、下列关于内存中地址映射的说法中,错误的是A、地址映射是指把程序的逻辑地址转变为物理地址的过程B、地址映射应在硬件的支持下完成C、在多道程序系统中,地址空间中的逻辑地址和内存中的物理地址是一致的D、由内存中的一系列单元所限定的地址范围称为内存空间,其中的地址称为物理地址正确答案:C11、进程切换使当前正在执行的进程成为被替换进程,出让其所使用的CPU,以运行被进程调度程序选中的新进程。

进程切换的第一个步骤是A、更新被替换进程的进程控制块B、将被替换进程的进程控制块移到就绪队列或阻塞队列C、修改进程状态,把执行态改为就绪态或者阻塞态D、保存包括程序计数器和其他寄存器在内的CPU上下文环境正确答案:D12、单道批处理系统的特点不包括A、顺序性B、自动性C、复杂性D、单道性正确答案:C13、在存储器的层次结构中,L3层是A、寄存器B、主存储器C、本地二级存储D、高速缓存正确答案:B14、下列关于进程状态的转换的说法中,错误的是A、进程状态可由执行态直接变为就绪态B、进程状态可以由就绪态直接变为执行态C、进程状态可以由阻塞态直接变为执行态D、进程状态可以由执行态直接变为阻塞态正确答案:C15、进程之间的高级通信机制不包括A、管道通信系统B、共享存储器系统C、共享处理器系统D、消息传递系统正确答案:C16、MS-DOS使用的磁盘分配方法是A、使用磁盘的链接表分配B、连续分配C、不连续分配D、使用内存的链接表分配正确答案:D17、下列关于存储器的说法中,错误的是A、主存暂时存放存储容量更大、速度更慢的磁盘上的数据B、主存的容量一般比高速缓存存储器大C、高速缓存存储器保存最常用的数据D、高速缓存存储器作为主存中数据和指令子集的缓冲区正确答案:C18、下列关于I/O通道的说法中,错误的是A、I/O通道是一种特殊的处理机B、I/O通道具有执行I/O指令的能力,并通过执行通道程序来控制I/O操作C、通道是中小型主机系统中专门用于I/O的专用计算机D、引入通道能够使CPU从控制I/O的任务中解脱,使CPU与I/O并行工作正确答案:C19、下列关于实时计算的说法中,正确的是A、实时计算的正确性仅依赖于系统计算的逻辑结果B、实时计算的正确性不仅依赖于系统计算的逻辑结果,还依赖于产生正确结果的时间C、实时计算的正确性不仅依赖于系统计算的逻辑结果,还依赖于系统计算所需要的存储空间D、实时计算的正确性仅依赖于系统计算产生正确结果的时间正确答案:B20、产生死锁的必要条件不包括A、不剥夺条件B、环路等待条件C、同步条件D、请求和保持条件正确答案:C21、通常,可执行程序以【】可执行文件的形式存储在磁盘上A、二进制B、十六进制C、八进制D、十进制正确答案:A22、【】用于接收从CPU发来的I/O命令或有关控制信息、设备状态。

本科操作系统试题及答案

本科操作系统试题及答案

本科操作系统试题及答案一、选择题(每题2分,共20分)1. 在操作系统中,进程和线程的区别在于()。

A. 进程有独立的地址空间,线程共享进程的地址空间B. 进程和线程都共享相同的地址空间C. 进程和线程都拥有独立的地址空间D. 进程和线程没有区别答案:A2. 分页管理中,页表项的主要作用是()。

A. 记录页面在内存中的位置B. 记录页面在磁盘中的位置C. 记录页面的访问权限D. 记录页面的修改时间答案:A3. 操作系统中的死锁是指()。

A. 系统无法正常启动B. 系统无法正常关机C. 两个或多个进程在执行过程中因争夺资源而造成的一种僵局D. 系统资源耗尽答案:C4. 在操作系统中,文件系统的主要功能是()。

A. 管理文件的存储B. 管理文件的权限C. 管理文件的创建和删除D. 所有以上选项答案:D5. 虚拟内存技术的主要目的是()。

A. 提高CPU的利用率B. 提高内存的利用率C. 提高磁盘的利用率D. 提高系统的响应速度答案:B6. 在操作系统中,中断处理程序的作用是()。

A. 响应外部设备请求B. 响应用户输入C. 响应系统错误D. 响应时间片到期答案:A7. 操作系统的调度算法中,轮转调度算法的主要特点是()。

A. 所有进程获得相同的CPU时间片B. 所有进程按照优先级获得CPU时间C. 所有进程按照到达时间获得CPU时间D. 所有进程按照最短作业优先获得CPU时间答案:A8. 在操作系统中,文件的索引节点(inode)通常包含()。

A. 文件名B. 文件大小C. 文件的物理位置D. 文件的创建时间答案:C9. 操作系统中的缓冲管理主要解决的问题是()。

A. 提高CPU的利用率B. 提高内存的利用率C. 提高磁盘的读写速度D. 提高系统的响应速度答案:C10. 在操作系统中,用户态和内核态的主要区别是()。

A. 用户态可以执行特权指令,内核态不可以B. 内核态可以执行特权指令,用户态不可以C. 用户态和内核态都可以执行特权指令D. 用户态和内核态没有区别答案:B二、填空题(每题2分,共20分)1. 在操作系统中,______ 是指进程在执行过程中,由于等待某些事件的发生而暂时停止执行的现象。

(完整word版)操作系统及参考答案

(完整word版)操作系统及参考答案

一、单项选择题1.若处理器有32位地址,则它的虚拟地址空间为( B )字节。

A 2GB B 4GBC 100KBD 640KB2.支持程序浮动的地址转换机制是( A )A 动态重定位B 段式地址转换C 页式地址转换D 静态重定位3.UNIX中的文件系统采用( D )。

A 网状文件B 记录式文件C 索引文件D 流式文件4.段页式管理每取一数据,要访问(C )次内存。

A 1B 2C 3D 45.文件系统的主要目的是( A )。

A 实现对文件的按名存取B 实现虚拟存贮器C 提高外围设备的输入输出速度D 用于存贮系统文档6. 某基于动态分区存储管理的计算机,其主存容量为55mb(初始为空),采用最佳适配算法,分配和释放的顺序为:分配15mb,分配30mb,释放15mb,分配8mb,分配6mb,此时主存中最大空闲分区的大小是( B )A 7mbB 9mbC 10mbD 15mb7.设计批处理多道系统时,首先要考虑的是( B )。

A 灵活性和可适应性B 系统效率和吞吐量C 交互性和响应时间D 实时性和可靠性8.进程调度的对象和任务分别是( C )。

A 作业,从就绪队列中按一定的调度策略选择一个进程占用CPUB 进程,从后备作业队列中按调度策略选择一个作业占用CPUC 进程,从就绪队列中按一定的调度策略选择一个进程占用CPUD 作业,从后备作业队列中调度策略选择一个作业占用CPU9.一种既有利于短小作业又兼顾到长作业的作业调度算法是( C )。

A 先来先服务B 轮转C 最高响应比优先D 均衡调度10.两个进程合作完成任务。

在并发执行中,一个进程要等待其合作伙伴发来消息,或者建立某个条件后再向前执行,这种制约性合作关系称为进程的(B )。

A 互斥B 同步C 调度D 伙伴11.当每类资源只有一个个体时,下列说法中不正确的是(C )。

A 有环必死锁B 死锁必有环C 有环不一定死锁D 被锁者一定全在环中12.在现代操作系统中引入了(D ),从而使并发和共享成为可能。

操作系统选择题带答案

操作系统选择题带答案

操作系统选择题带答案操作系统选择题带答案1.什么是操作系统?答案:操作系统是一种软件,它是计算机系统中最基本的系统软件之一,负责管理和控制计算机系统的硬件和软件资源,为用户和其他软件提供一个方便、高效、安全和可靠的环境。

2.操作系统的主要功能有哪些?答案:操作系统的主要功能包括进程管理、存储管理、文件管理、设备管理和用户接口等。

具体来说:- 进程管理:负责管理和控制系统中的进程,包括进程的创建、调度、协作和终止等。

- 存储管理:负责管理和控制系统中的内存资源,包括内存分配、内存保护、内存回收和虚拟内存等。

- 文件管理:负责管理和控制系统中的文件资源,包括文件的创建、读写、删除和保护等。

- 设备管理:负责管理和控制系统中的各种设备资源,包括设备分配、设备驱动程序和设备中断处理等。

- 用户接口:提供用户与计算机系统之间的交互界面,包括命令行接口、图形用户界面和网络接口等。

3.操作系统的内核有哪些类型?答案:操作系统的内核可以分为单体内核、微内核和外核等。

具体来说:- 单体内核:将操作系统的所有功能模块集中到一个单一的可执行文件中。

这种内核结构简单,性能较好,适合于资源有限的系统。

- 微内核:将操作系统的核心功能模块以及其他模块分开,只保留核心功能在内核中,将其他模块实现为用户空间的服务。

这种内核结构更灵活,可扩展性较好,但性能较差。

- 外核:将操作系统的核心功能模块实现为用户空间的服务,通过系统调用的方式与应用程序交互。

这种内核结构更灵活,可定制性更好,但性能和安全性较差。

4.进程和线程有什么区别?答案:进程是指在计算机中执行的一个程序,它是一个独立的执行单位,有独立的地质空间和系统资源。

而线程是进程中的一个执行流程,它与同一个进程中的其他线程共享地质空间和系统资源。

具体来说,进程有自己的独立地质空间,包括代码段、数据段和堆栈段等,它们彼此之间是相互独立的。

而线程共享进程的地质空间,它们可以访问同一个进程的数据,通过共享内存来实现数据的共享。

操作系统原理试题及答案

操作系统原理试题及答案

操作系统原理试题及答案一、单项选择题(每题2分,共20分)1. 操作系统的主要功能不包括以下哪一项?A. 进程管理B. 存储管理C. 设备管理D. 网络管理答案:D2. 在操作系统中,进程和线程的关系是?A. 线程是进程的一部分B. 进程是线程的一部分C. 进程和线程是完全独立的D. 进程和线程是同一个概念答案:A3. 下列哪项不是操作系统的五大基本功能?A. 文件管理B. 作业调度C. 内存管理D. 网络通信答案:B4. 操作系统的调度算法中,时间片轮转调度算法的特点是?A. 所有进程获得相等的CPU时间B. 进程按到达顺序获得CPU时间C. 进程按优先级获得CPU时间D. 进程按最长运行时间获得CPU时间答案:A5. 在操作系统中,虚拟内存的作用是什么?A. 提高CPU的运行速度B. 提高磁盘的读写速度C. 扩展可用的物理内存D. 减少磁盘的读写次数答案:C6. 下列哪项技术用于实现文件的共享?A. 缓冲技术B. 虚拟存储技术C. 多道程序设计D. 文件系统答案:D7. 在操作系统中,死锁的四个必要条件不包括以下哪一项?A. 互斥条件B. 占有和等待条件C. 不剥夺条件D. 循环等待条件答案:A8. 操作系统中,分页和分段的区别在于?A. 分页是固定大小的,分段是可变大小的B. 分页是可变大小的,分段是固定大小的C. 分页和分段都是固定大小的D. 分页和分段都是可变大小的答案:A9. 下列哪项不是操作系统提供的服务?A. 系统调用B. 设备驱动C. 用户界面D. 编译器答案:D10. 在操作系统中,中断和异常的区别是?A. 中断是由硬件产生的,异常是由软件产生的B. 中断是由软件产生的,异常是由硬件产生的C. 中断和异常都是由硬件产生的D. 中断和异常都是由软件产生的答案:A二、填空题(每题2分,共20分)1. 在操作系统中,_________是操作系统提供给用户和应用程序的接口。

答案:系统调用2. 操作系统的_________是操作系统分配CPU时间给进程的策略和算法。

计算机操作系统试题及答案

计算机操作系统试题及答案

计算机操作系统试题及答案一、选择题1、操作系统是一种()。

A 应用软件B 系统软件C 工具软件D 调试软件答案:B操作系统是管理计算机硬件与软件资源的程序,是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行。

2、以下不属于操作系统主要功能的是()。

A 进程管理B 存储管理C 设备管理D 文字处理答案:D操作系统的主要功能包括进程管理、存储管理、设备管理、文件管理和作业管理等。

文字处理通常是由专门的文字处理软件来完成,不是操作系统的主要功能。

3、在多道程序设计环境中,操作系统分配资源以()为基本单位。

A 程序B 进程C 作业D 指令答案:B进程是操作系统进行资源分配和调度的基本单位。

4、下列进程状态的转换中,不正确的是()。

A 就绪→运行B 运行→就绪C 运行→阻塞D 阻塞→运行答案:D进程状态的转换中,阻塞状态不能直接转换为运行状态,必须先转换为就绪状态,然后再被调度为运行状态。

5、临界区是指()。

A 一段程序B 一段数据区C 一种同步机制D 访问共享资源的程序段答案:D临界区是指访问共享资源的程序段,在这段程序中,进程可能会改变共享变量的值。

6、采用时间片轮转调度算法时,时间片过大,系统的性能将会()。

A 降低B 提高C 不变D 不确定答案:A时间片过大,会使得每个进程都能在一个时间片内完成大部分工作,导致进程切换次数减少,系统的响应时间变长,性能降低。

7、下面关于死锁的论述中,正确的是()。

A 死锁是指系统中多个进程无限期地等待永远不会发生的条件B 死锁是指系统中多个进程竞争资源而产生的一种僵持状态C 死锁是指系统中多个进程同时被阻塞,并永远无法唤醒D 死锁是指系统中多个进程相互等待对方释放资源答案:D死锁是指多个进程在运行过程中因争夺资源而造成的一种僵局,若无外力作用,这些进程都将无法向前推进,即相互等待对方释放资源。

8、以下存储管理方式中,会产生内部碎片的是()。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Question1Concurrency plays a major part in which of the following specific contexts:选择一个答案a. Multiple applicationsb. All of the above √c. Structured applicationsd. O/S structureQuestion2In order to implement mutual exclusion on a critical resource for competing processes, only one program at a time should be allowed选择一个答案a. In the critical section of the program √b. None of the abovec. To Exhibit cooperationd. To perform message passingQuestion3The following requirement must be met by any facility or capability that is to provide support for mutual exclusion:选择一个答案a. All of the above √b. Only one process at a time can be allowed into a critical code sectionc. A process remains in its critical code section for a finite time onlyd. No assumptions can be made about relative process speedsQuestion4Processes that are designed to be able to pass execution control back and forth between themselves are referred to as选择一个答案a. None of the aboveb. Threadsc. Coroutines √d. Busy waiting processesQuestion5Processes that are designed to be able to pass execution control back and forth between themselves are referred to as选择一个答案a. Coroutines √b. Threadsc. None of the aboved. Busy waiting processesQuestion6In a uniprocessor system, mutual exclusion can be guaranteed by选择一个答案a. Interleaving processesb. Disabling interrupts √c. Overlapping processesd. All of the aboveQuestion7A semaphore that does not specify the order in which processes are removed from the queue is called a选择一个答案a. Binary semaphoreb. Weak semaphore √c. None of the aboved. Strong semaphoreQuestion8The finite circular buffer is used to implement which of the following basic queuing strategies选择一个答案a. LIFOb. FILOc. FIFO √d. None of the aboveQuestion9A chief characteristic of a monitor is:选择一个答案a. A maximum of two processes may be executing in a monitor at a timeb. All of the abovec. Local data variables of the monitor are accessible by any procedure requesting use of the monitord. A process enters the monitor by invoking one of its procedures √Question10In synchronization involving message passing, the sender of a message can be选择一个答案a. Only blockingb. All of the abovec. Only non-blockingd. Either blocking or non-blocking √Question11In a system employing message passing, when a message is sent to a shared temporary data structure, this general approach is known as选择一个答案a. Direct addressingb. Blockingc. Indirect addressing √d. None of the aboveQuestion12In a system employing message passing, the typical message is divided into two primary sections 选择一个答案a. None of the above √b. Body and mailboxc. Destination ID and Source IDd. Header and mailboxQuestion13The Reader/Writer problem requires that certain conditions be satisfied, such as:选择一个答案a. Any number of readers may simultaneously read from the file √b. None of the abovec. Readers may read from the file while writers are writing to itd. Multiple writers may write to the file simultaneouslyAny number of readers may simultaneously read from the fileQuestion14A reason why the Producer/Consumer problem cannot be considered a special case of the Reader/Writer problem with a single writer (the producer) and a single reader (the consumer) is: 选择一个答案a. None of the aboveb. The Producer/Consumer problem doesn’t deal with concurrency issuesc. The producer and consumer must be both reader and writer √d. The consumer must perform writes while the reader performs readsQuestion15Examples of solutions to the concurrency problem that do not involve busy waiting are the following:选择一个答案a. None of the above √b. Semaphores and monitorsc. Producers and consumersd. Message passing and cachingQuestion16A basic echo procedure (that echoes a typed character to the screen) running on a multiprocessor system can produce erroneous output if选择一个答案a. Two processes deadlock while in the echo codeb. Access to the echo procedure is uns ynchronized √c. None of the aboved. Access to the echo procedure is synchronizedMultiple Choice Questions 6Question1The permanent blocking of a set of processes that either compete for system resources or communicate with each other is called:选择一个答案a. Starvationb. All of the abovec. Prioritizationd. Deadlock √死锁是一组竞争系统资源或互相通信的竞争间相互的"永久"阻塞Question2In deadlocked process recovery, selection criteria for choosing a particular process to abort or rollback includes designating the process with the:选择一个答案a. Least total resources allocated so farb. Lowest priorityc. All of the above √d. Most estimated time remaining中文P196 死锁检测后恢复过程对“牺牲”进程的选择Question3One approach to an integrated strategy for dealing with deadlocks involves the implementation of:选择一个答案a. Process rollbacksb. Virtual memoryc. Resource classes √d. None of the above综合死锁策略:资源分类Question4The Dining Philosopher’s Problem is a standard test case for evaluating approaches to implementing: 选择一个答案a. Synchronization √b. Starvationc. All of the aboved. Deadlock哲学家进餐问题是评价同步方法的一个测试标准Question5A software mechanism that informs a process of the occurrences of asynchronous events in UNIX are called:选择一个答案a. Pipesb. Messagesc. Signals √d. All of the above信号是用于通知发生一个同步事件的软件机制Question6Thread synchronization primitives supported by Solaris include:选择一个答案a. Condition variablesb. Semaphoresc. All of the above √d. Mutual exclusion (mutex) locks互斥锁、信号量、多读者单写者锁、条件变量Question7The family of synchronization objects implemented by W2K include:选择一个答案a. Mutex objectsb. Event objectsc. All of the above √d. Semaphore objects事件、互斥、信号量、可等待的计时器Question8All deadlocks involve conflicting needs for resources by:选择一个答案a. Three or more processesb. One or more processesc. None of the aboved. Two or more processes √两个或多个进程资源需求冲突Question9A resource that can be created and destroyed is called a:选择一个答案a. Reusable resourceb. Producible resourcec. Consumable resource √d. All of the above可重用资源 VS 可消费资源Question10An example of a consumable resource is the following:选择一个答案a. All of the aboveb. Main Memoryc. Messages √d. Printers可创建可销毁的信息资源Question11A condition of policy that must be present for a deadlock to be possible is:选择一个答案a. Mutual exclusionb. No preemptionc. All of the above √d. Hold and wait三个必要条件Question12A direct method of deadlock prevention is to prevent the occurrence of:选择一个答案a. Hold and waitb. All of the abovec. Circular wait √d. Mutual exclusion死锁预防的直接法Question13In the Resource Allocation Denial approach to Deadlock Avoidance, a safe state is defined as one in which:选择一个答案a. At least one potential process sequence does not result in a deadlock √b. None of the abovec. All potential process sequences do not result in a deadlock:d. Several potential process sequences do not result in a deadlock:一条安全道路便可Question14A conservative strategy for dealing with deadlocks that involves limiting access to resources and imposing restrictions on processes is called:选择一个答案a. None of the aboveb. Deadlock Prevention √c. Deadlock Detectiond. Deadlock Avoidance资源预防Multiple Choice Questions 7Question1The task of subdividing memory between the O/S and processes is performed automatically by the O/S and is called:选择一个答案a. All of the aboveb. Protectionc. Memory Management √d. Relocation内存管理Question2A reference to a memory location independent of the current assignment of data to memory is called a: 选择一个答案a. Absolute addressb. None of the abovec. Logical address √d. Relative address逻辑地址的定义Question3An actual location in main memory is called a:选择一个答案a. Relative addressb. Absolute address √c. Logical addressd. None of the above物理地址即绝对地址Question4The page table for each process maintains:选择一个答案a. None of the aboveb. The frame location for each page of the process √c. The physical memory location of the processd. The page location for each frame of the process页号对应帧号Question5In a system employing a paging scheme for memory management, wasted space is due to:选择一个答案a. Internal fragmentation √b. Pages and frames of different specified sizesc. None of the aboved. External fragmentation固定分区和分页都产生内部碎片Question6In a system employing a segmentation scheme for memory management, wasted space is due to: 选择一个答案a. Internal fragmentationb. External fragmentation √c. None of the aboved. Segments of different sizes动态分区和分段都产生外部碎片Question7In a system employing a segmentation scheme for memory management, a process is divided into: 选择一个答案a. A number of segments which must be of equal sizeb. None of the abovec. A number of segments which need not be of equal size √d. One segment per thread分段:多个大小不等的块Question8The concept of Memory Management satisfies certain system requirements, including:选择一个答案a. Relocationb. Physical organizationc. All of the above √d. Protection重定位、保护、共享、逻辑组织、物理组织Question9The practice in which a program and data are organized in such a way that various modules can be assigned the same region of memory is called:选择一个答案a. Sharingb. None of the abovec. Overlaying √d. Relocation覆盖Question10The concept of virtual memory is based on one or both of two basic techniques:选择一个答案a. Segmentation and paging √b. None of the abovec. Overlaying and relocationd. Segmentation and partitioning虚拟=>分段分页Question11A problem with the largely obsolete Fixed Partitioning memory management technique is that of:选择一个答案a. Inefficient use of memoryb. Internal fragmentationc. Allowing only a fixed number of Processesd. All of the above √Question12The problem of internal fragmentation can be lessened in systems employing a fixed-partition memory management scheme by using:选择一个答案a. Unequal size partitions √b. Random size partitionsc. Equal size partitionsd. None of the above分段解决内部碎片,但是会引入外部碎片Question13In the Dynamic Partitioning technique of memory management, the phenomenon that results in unused blocks of memory outside of existing partitions is called:选择一个答案a. Compactionb. Internal fragmentationc. None of the aboved. External fragmentation √动态分区外部碎片Question14In the Dynamic Partitioning technique of memory management, the placement algorithm that chooses the block that is closest in size to the request is called:选择一个答案a. All of the aboveb. Next-fitc. First-fitd. Best-fit √最佳适配,首次适配,邻近适配Question15In the Dynamic Partitioning technique of memory management, the placement algorithm that scans memory from the location of the last placement and chooses the next available block that large enough to satisfy the request is called:选择一个答案a. First-fitb. All of the abovec. Best-fitd. Next-fit √Multiple Choice Questions 8Question1The type of memory that allows for very effective multiprogramming and relieves the user of me mory size constraints is referred to as:选择一个答案a. Virtual memory √b. Real memoryc. Main memoryd. All of the aboveQuestion2The replacement policy that is impossible to implement because it would require the O/S to have perfect knowledge of future events is called the:选择一个答案a. Least recently used (LRU) policyb. Clock policyc. Optimal policy √d. None of the aboveQuestion3The replacement policy that chooses only among the resident pages of the process that generate d the page fault in selecting a page to replace is referred to as a:选择一个答案a. Local replacement policy √b. Variable replacement policyc. Global replacement policyd. None of the aboveQuestion4The concept associated with determining the number of processes that will be resident in mainmemory is referred to as:选择一个答案a. A cleaning policyb. Load Controlc. None of the aboved. The page fault frequency √Question5In SVR4 and Solaris systems, the memory management scheme that manages user processes and disk I/O is called the:选择一个答案a. Paging system √b. None of the abovec. Virtual memory managerd. Kernel memory allocatorQuestion6The multilevel memory management scheme implemented in Linux was designed to minimize lar ge page tables and directories in which of the following line of processors:选择一个答案a. 32-bit Pentium/X86 architectureb. 16-bit X86 architecturec. 64-bit Alpha architecture √d. None of the aboveQuestion7The Windows 2000 virtual memory manager can use page sizes ranging from:选择一个答案a. 64 KB to 4 GBb. None of the abovec. 4 KB to 64 KB √d. 4 GB to 4 TBQuestion8The situation where the processor spends most of its time swapping process pieces rather than e xecuting instructions is called:选择一个答案a. Pagingb. The Principle of Localityc. None of the aboved. Thrashing √Question9The situation that occurs when the desired page table entry is not found in the Translation Lookas ide Buffer (TLB) is called a:选择一个答案a. None of the aboveb. TLB hitc. TLB miss √d. Page faultQuestion10The real address of a word in memory is translated from the following portions of a virtual addres s:选择一个答案a. None of the aboveb. Frame number and offsetc. Page number and frame numberd. Page number and offset √Question11Segmentation has a number of advantages to the programmer over a non-segmented address sp ace, including:选择一个答案a. Sharing among processesb. Simplifying the handling of growing data structuresc. All of the above √d. ProtectionQuestion12In a combined paging/segmentation system, a user’s address space is broken up into a number of :选择一个答案a. Fixed-size pages, which are in turn broken down into variable-sized segmentsb. Segments or pages, at the discretion of the programmerc. Variable-sized Segments, which are in turn broken down into fixed-size pages √d. All of the aboveQuestion13Sharing is achieved in a segmentation system by:选择一个答案a. Having a common data area that all processes can shareb. Referencing a segment in the segment tables of more than one process √c. All of the aboved. Each process segment table having a reference to the dispatcher main memory area Question14A fundamental choice in the design of the memory-management portion of an O/S is:选择一个答案a. Whether or not to use virtual memory techniquesb. All of the above √c. Whether to use paging, segmentation of a combination of the twod. The algorithms employed for various aspects of memory managementQuestion15The fetch policy that exploits the characteristics of most secondary memory devices, such as disks , which have seek time and rotational latency is called:选择一个答案a. Swappingb. Demand pagingc. Prepaging √d. None of the aboveMultiple Choice Questions 9Question1The type of scheduling that involves the decision to add a process to those that are at least partia lly in main memory and therefore available for execution is referred to as:选择一个答案a. Medium-term scheduling √b. None of the abovec. Long-term schedulingd. I/O schedulingQuestion2One difficulty with the Shortest Process Next (SPN) scheduling technique is:选择一个答案a. All of the above √b. The lack of preemptionc. The need to know or estimate required processing times for each processd. The starvation of longer processesQuestion3One difficulty with the Shortest Remaining Time (SRT) scheduling technique is:选择一个答案a. The lack of preemptionb. The starvation of shorter processesc. The need to know or estimate required processing times for each process √d. All of the aboveQuestion4Which of the following scheduling policies require prior knowledge or estimation of process lengt h:选择一个答案a. Highest Response Ratio Next (HRRN)b. Shortest Remaining Time (SRT)c. Shortest Process Next (SPN)d. All of the above √Question5It is impossible to make definitive comparisons of various scheduling policies due to dependence on factors such as:选择一个答案a. The probability distribution of service times of the various processesb. The efficiency of the scheduling and context switching mechanismsc. All of the above √d. The nature of the I/O demand and performance of the I/O subsystemQuestion6The strategy that schedules processes based on their group affiliation is generally referred to as: 选择一个答案a. Fair share scheduling √b. All of the abovec. Simulation modelingd. Queuing analysis公平共享Question7The traditional UNIX scheduler divides processes into fixed bands of priority levels, with the highe st priority band being the:选择一个答案a. User process bandb. None of the abovec. File manipulation bandd. Swapper band √Question8The decision as to which job to admit to the system next can be based on which of the following c riteria:选择一个答案a. Priorityb. Simple FIFOc. I/O requirementsd. All of the above √Question9Typically, the swapping-in function for processes is based on the need to manage:选择一个答案a. Virtual memoryb. The degree of multiprogramming √c. None of the aboved. Process prioritiesQuestion10In terms of frequency of execution, the short-term scheduler is usually the one that executes:选择一个答案a. Least frequentlyb. None of the abovec. About the same as the other schedulersd. Most frequently √Question11Response time in an interactive system is an example of:选择一个答案a. System-oriented criteria for short-term scheduling policiesb. None of the abovec. User-oriented criteria for short-term scheduling policies √d. System-oriented criteria for long-term scheduling policiesQuestion12A typical way to overcome starvation of lower-priority processes in a priority-based scheduling sy stem is to:选择一个答案a. Round-robin cycling of processes in a priority queueb. All of the abovec. Change a process priority randomlyd. Change a process priority with its age √Question13Which of the following scheduling policies allow the O/S to interrupt the currently running proces s and move it to the Ready state?选择一个答案a. First-come-first-servedb. Non-Preemptivec. None of the aboved. Preemptive √Question14In terms of the queuing model, the total time that a process spends in a system (waiting time plu s service time) is called:选择一个答案a. None of the aboveb. Normalized turnaround time (TAT)c. Turnaround or residence time (TAT) √d. Finish time (FT)Question15In the Round Robin scheduling technique, the principle design issue is:选择一个答案a. Determining the fair distribution of time quanta to individual processesb. Determining the length of the time quantum √c. None of the aboved. Determining the method of cycling through a given set of processesMultiple Choice Questions 10Question1An example of the key differences that can exist across (and even in) classes of I/O devices is:选择一个答案a. Error conditionsb. Data ratec. Data representationd. All of the above √Question2The following disk scheduling policy is useful as a benchmark against which to evaluate other disk scheduling policies because it provides a worst-case scenario:选择一个答案a. Priority schedulingb. FIFO schedulingc. None of the aboved. Random scheduling √Question3The disk scheduling algorithm that implements two subqueues in a measure to avoid the proble m of “arm stickiness” is the:选择一个答案a. All of the aboveb. FSCAN policy √c. N-step-SCAN policyd. C-SCAN policyQuestion4Which of the following RAID levels implement some form of parity calculation to introduce redun dancy:选择一个答案a. RAID Level 4b. RAID Level 6c. All of the above √d. RAID Level 2Question5The disk cache replacement strategy that replaces the block that has experienced the fewest references is called:选择一个答案a. Least Referenced (LR)b. Least Frequently Used (LFU) √c. All of the aboved. Least Recently Used (LRU)Question6In a UNIX system, which of the following types of I/O devices make use of character queues:选择一个答案a. Communications lines √b. Tape drivec. All of the aboved. Disk driveQuestion7In a W2K system, the I/O manager module that includes lazy write and lazy commit services to im prove overall performance is the:选择一个答案a. Hardware device driversb. File system driversc. Cache manager √d. None of the aboveQuestion8The I/O technique where the processor busy waits for an I/O operation to complete is called:选择一个答案a. Direct memory access (DMA)b. Programmed I/O √c. Interrupt-driven I/Od. None of the aboveQuestion9The system configuration that includes an I/O module which is a separate processor with a specia lized instruction set can be referred to using the following terminology:选择一个答案a. Direct Memory Access (DMA)b. All of the above √c. I/O Channeld. I/O ProcessorQuestion10The bus configuration for DMA that provides no path other than the system bus between the DM A module(s) and I/O devices is:选择一个答案a. I/O busb. Single bus, detached DMA √c. Single bus, integrated DMA-I/Od. None of the aboveQuestion11The primary objective in designing the I/O facility of a computer system that deals with the desire to handle all I/O devices in a uniform manner is referred to as:选择一个答案a. Directory managementb. Generality √c. None of the aboved. EfficiencyQuestion12In a hierarchical structure for managing I/O on a secondary storage device that supports a file syst em, the layer that is closest to the hardware is the:选择一个答案a. Device I/O layerb. None of the above √c. Physical organization layerd. Directory management layerQuestion13An example of a block-oriented I/O device is:选择一个答案a. Modemb. All of the abovec. CD-ROM √d. PrinterQuestion14The scenario where multiple buffers are used in an attempt to alleviate the problem of absorbing rapid bursts of I/O is typically referred to as:选择一个答案a. None of the aboveb. Double bufferingc. Circular buffering √d. Single bufferingMultiple Choice Questions 11Question1A file is generally defined to be:选择一个答案a. All of the aboveb. A collection of related fieldsc. A basic element of datad. A collection of similar records √Question2Fixed file blocking experiences the following potential problem:选择一个答案a. External fragmentationb. None of the abovec. Internal fragmentation √d. Gaps due to hardware designQuestion3In which of the following file allocation methods is preallocation required:选择一个答案a. Indexedb. None of the abovec. Chainedd. Contiguous √Question4The technique of free disk space management that employs a pointer and length value of each fr ee portion is the:选择一个答案a. None of the above √b. Free block listc. Bit tablesd. IndexingQuestion5The data structure that maintains information on available disk space is called the:选择一个答案a. File Allocation Table (FAT)b. None of the abovec. Bit Tabled. Disk Allocation Table √Question6File allocation in a UNIX system has the following characteristics:选择一个答案a. Dynamic allocation using non-contiguous blocks with indexing √b. Preallocation using non-contiguous blocks without indexingc. None of the aboved. Dynamic allocation using contiguous blocks without indexingQuestion7In a W2K NTFS file system, the smallest physical storage unit on the disk (almost always 512 bytes ) is called a:选择一个答案a. Clusterb. Volumec. Sector √d. None of the aboveQuestion8The level of the file system architecture that enables users and applications to access file records i s called the:选择一个答案a. Logical I/O level √b. All of the abovec. Basic I/O supervisor leveld. Basic file system levelQuestion9Record access in a pile file can be conducted by:选择一个答案a. Key fieldb. All of the abovec. Exhaustive search √d. Partial indexQuestion10Sequential files are optimal in scenarios involving:选择一个答案a. Applications that require infrequent updatesb. All of the abovec. Applications that require frequent queriesd. Applications that require the processing of all records in the file √Question11Indexed sequential files similar to sequential files, but contain two added features:选择一个答案a. File index and overflow file √b. Hash function and an overflow filec. All of the aboved. Hash function and file indexQuestion12Direct or hashed files are often used where:选择一个答案a. Fixed length records are usedb. All of the above √c. Very rapid access is requiredd. Records are always accessed one at a timeQuestion13The file directory information element that holds information such as the identity of the creator o f the file is the:选择一个答案a. All of the aboveb. Address information elementc. Usage information element √d. Access control information elementQuestion14In a tree-structured directory, the series of directory names that culminates in a file name is refer red to as the:选择一个答案a. Pathname √b. Working directoryc. None of the aboved. Symbolic nameQuestion15Access rights on a file typically are considered to constitute a hierarchy, with each right implying t hose that:选择一个答案a. Precede it √b. Succeed itc. None of the aboved. Supercede it。

相关文档
最新文档