操作系统基础基本理论、基本方法复习
全国硕士研究生入学统一考试计算机专业基础综合考试大纲解析

全国硕士研究生入学统一考试计算机专业基础综合考试大纲解析一、考试性质与目的全国硕士研究生入学统一考试计算机专业基础综合考试是为了测试考生计算机科学与技术学科各个方向的基础理论、基本知识和基本技能的考试,为国家培养计算机科学与技术领域高层次学科人才。
通过考试,应能够全面掌握计算机科学与技术的基本理论、基本知识和基本技能,并能运用所学知识和技能解决有关实际问题。
二、考试内容与知识点1. 数据结构掌握数据结构的基本概念、基本原理和基本方法;熟悉常见的数据结构类型、存储方式以及相关操作;了解数据结构的动态组织和调整方法。
2. 计算机组成原理掌握计算机的基本组成和工作原理;了解计算机系统的层次结构和技术特点;了解计算机系统的基本硬件结构和技术指标。
3. 操作系统掌握操作系统的基本概念、基本原理和基本技术;了解操作系统的基本功能和作用;熟悉常见操作系统的使用和配置方法。
4. 计算机网络掌握计算机网络的基本概念、基本原理和基本技术;了解计算机网络的基本组成和分类;熟悉常见网络协议和网络设备。
5. 数据库系统掌握数据库的基本概念、基本原理和基本技术;了解数据库系统的设计方法和应用技术;熟悉常见数据库管理系统。
三、考试形式与试卷结构1. 考试形式:闭卷、笔试。
2. 试卷满分为150分。
3. 考试时间为180分钟。
4. 试卷内容结构:数据结构约占40%,计算机组成原理约占30%,操作系统约占20%,计算机网络和数据库系统各占5%。
5. 考试题型:选择题、填空题、简答题和论述题等。
6. 评分标准:按照答案要点给分,答案正确且表述清晰、逻辑严谨者得满分,答案不完整则根据其正确程度酌情给分。
7. 答题方式:考生在答题卡上作答,须在规定时间内完成答题。
四、复习建议1. 全面掌握基础知识,注重各学科之间的联系和融合。
2.注重实践和应用,提高解决实际问题的能力。
3. 针对考试题型进行练习,提高答题速度和准确性。
《操作系统》课程设计

《操作系统》课程设计一、课程目标知识目标:1. 让学生掌握操作系统的基本概念,包括进程、线程、内存管理、文件系统等核心知识;2. 了解操作系统的历史发展,掌握不同类型操作系统的特点及使用场景;3. 掌握操作系统的性能评价方法和常用的调度算法。
技能目标:1. 培养学生运用操作系统知识解决实际问题的能力,如分析系统性能瓶颈、优化系统资源分配等;2. 培养学生具备基本的操作系统编程能力,如进程创建、线程同步、文件操作等;3. 提高学生的团队协作能力和沟通能力,通过小组讨论和项目实践,学会共同解决问题。
情感态度价值观目标:1. 培养学生对操作系统学科的兴趣,激发学生的学习热情,使其形成积极向上的学习态度;2. 培养学生具备良好的信息素养,尊重知识产权,遵循法律法规;3. 培养学生的创新精神和批判性思维,敢于质疑、勇于探索,形成独立思考的能力。
课程性质:本课程为计算机科学与技术专业的核心课程,旨在让学生掌握操作系统的基本原理和实现方法,提高学生的系统分析和编程能力。
学生特点:学生具备一定的编程基础和计算机系统知识,具有较强的逻辑思维能力和动手实践能力。
教学要求:结合学生特点和课程性质,注重理论与实践相结合,通过案例分析和项目实践,帮助学生将所学知识内化为具体的学习成果。
在教学过程中,关注学生的学习进度和反馈,及时调整教学策略,确保课程目标的实现。
二、教学内容1. 操作系统概述:介绍操作系统的定义、发展历程、功能、类型及特点,对应教材第一章内容。
- 操作系统的起源与发展- 操作系统的功能与类型- 操作系统的主要特点2. 进程与线程:讲解进程与线程的概念、状态、调度算法,对应教材第二章内容。
- 进程与线程的定义与区别- 进程状态与转换- 进程调度算法3. 内存管理:分析内存管理的基本原理、策略和技术,对应教材第三章内容。
- 内存分配与回收策略- 虚拟内存技术- 页面置换算法4. 文件系统:介绍文件系统的基本概念、结构、存储原理,对应教材第四章内容。
计算机软考初级证书 信息系统软考

题目:深度探讨计算机软考初级证书信息系统软考一、背景介绍计算机软考初级证书是全国计算机技术与软件专业人才统一考试的一种,是由我国人事部主管的全国计算机等级考试(NCRE)的一种证书。
信息系统软考则是计算机软考初级证书中的一个分类,主要考察考生对信息系统的基本理论、基本技术、基本方法和基本工具等方面的能力。
二、计算机软考初级证书信息系统软考的内容1.信息系统基本理论在信息系统软考中,基本理论是非常重要的内容之一。
信息系统的基本理论包括信息系统的定义、信息系统的分类、信息系统的组成部分等。
考生需要熟悉并理解信息系统的基本理论,才能在实际工作中更好地应用信息系统技术。
2.信息系统基本技术另外,信息系统软考还包括信息系统的基本技术。
这些基本技术主要包括数据库技术、网络技术、操作系统技术等。
通过对这些基本技术的学习,考生能够了解信息系统软件的运行机制,以及在实际工作中如何更好地利用信息系统软件。
3.信息系统基本方法在信息系统软考中,还需要掌握信息系统的基本方法。
这些基本方法包括信息系统的分析方法、设计方法、评价方法等。
通过对这些基本方法的学习,考生能够更好地理解信息系统的建设过程,并且能够在实际工作中运用这些方法来解决实际问题。
4.信息系统基本工具信息系统软考还需要掌握信息系统的基本工具。
这些基本工具主要包括信息系统的建模工具、数据库工具、开发工具等。
通过对这些基本工具的学习,考生能够更好地掌握信息系统的建设技术,并且能够在实际工作中更加熟练地使用这些工具。
三、个人观点和理解计算机软考初级证书中的信息系统软考是一个非常重要的证书,它涵盖了信息系统相关的基本理论、基本技术、基本方法和基本工具等方面的内容。
在信息化的今天,信息系统软考的重要性不言而喻。
通过对信息系统软考的学习,考生能够更好地掌握信息系统的相关知识,提高自己的信息化能力,为自己的职业发展打下坚实的基础。
四、总结回顾计算机软考初级证书信息系统软考的内容涵盖了信息系统的基本理论、基本技术、基本方法和基本工具等方面的内容。
计算机操作的基本指令

计算机操作基础理论复习题(部分)1.I/O接口位于()。
A.总线和设备之间B.CPU和I/O设备之间C.主机和总线之间D.CPU和主存储器之间ANS:A2.微机上使用的显示器是一种()。
A.输入设备B.输出设备C.存储设备D.缓冲器ANS:B3.ISA、EISA、VESA、PCI是微机中()的标准。
A.显示器B.主板C.总线D.存储器ANS:C4.在微机系统中,VGA的含义是()。
A.微机型号B.键盘型号C.显示标准D.显示型号ANS:C5.在P-Ⅱ型微机中,P-Ⅱ是指()。
A.产品型号B.主频速度C.微机系统名称D.中央处理器型号ANS:D6.使用Pentium/200芯片的微机,其CPU主频为()。
A.400MHzB.300MHzC.200MHzD.100MHzANS:C7.下列设备中不能作为输出设备的是()。
A.打印机B.显示器C.绘图仪D.键盘ANS:D8.个人计算机属于()。
A.小巨型机B.小型计算机C.微型计算机D.中型计算机ANS:C9.办公自动化是计算机的一项应用,按计算机应用的分类,它应属于()。
A.科学计算B.实时控制C.数据处理D.辅助设计ANS:C10.现代电子计算机的基本工作原理是“存储程序,顺序执行”指令,是由科学家()提出的。
A.加里略B.法拉第C.牛顿D.冯诺依曼ANS:D11.CAD是指()。
A.计算机辅助教育B.计算机辅助设计C.计算机辅助制造D.计算机专家系统ANS:B12.采用电子管为元件的计算机被称为计算机发展的()。
A.第一代B.第二代C.第三代D.第四代ANS:A13.把二进制数1101001转换成十六进制数为()。
A.69B.D2C.D1D.6AANS:A14.十进制数55对应的二进制数是()。
A.110111B.101001C.101000D.111001ANS:A15.下列数中,数值最小的是()。
A.八进制数246B.十进制数168C.十六进制数E2D.二进制数10101010ANS:A16.十六进制数111转换成二进制数是()。
计算机基础复习资料整理

计算机基础复习要点整理一、人物英国数学家巴贝奇研制的分析机因具备现代计算机的5大装置(输入、处理、存储、控制和输出)而被尊称为计算机之父;英国科学家图灵因提出图灵机模型和人工智能而被尊称为计算机科学之父;美籍匈牙利数学家冯诺依曼因提出现代计算机的思想体系(存储程序和控制程序)以及二进制而被尊称为电子计算机之父。
岛正利被称为微型计算机之父。
钱天白教授因登记注册了我国的顶级域名.cn并建立第一个CN域名服务器而被尊称为“中国上网第一人”。
北大教授王选因首创用矢量法描述汉字笔画轮廓,解决汉字排版问题而被尊称为当代毕升。
二、重大事件1946年世界上公认的第一台电子计算机ENIAC在美国宾夕法尼亚大学研制成功。
2001年我国推出首例具有自主知识产权的32位嵌入式CPU是“方舟1号”,2002年9月,我国具有自主知识产权的第一款商用化通用化高性能CPU“龙芯1号”,这标志我国结束“无芯”历史。
长城0520CH是我国自行研制的第一台能处理汉字的微型计算机三、基本知识和理论1、计算机怎样分代?答:按照计算机采用逻辑元件的不同,可以将计算机分代为:以电子管为逻辑元件的第一代计算机,以晶体管为逻辑元件的第二代计算机,以集成电路为逻辑元件的第三代计算机和以超大规模集成电路为逻辑原件的第四代计算机。
按计算机技术发展变化的历程,又可分为大型机、小型机、微型机、客户机/服务器和互联网5个发展阶段。
2、计算机怎样分类?答:1989年美国IEEE(电气和电子工程师学会)将计算机分为巨型机、大型机、小型机、微型机、工作站和个人计算机6大类。
按照日常所见又分为:服务器、台式机、笔记本、掌上计算机和嵌入式计算机5大类。
3、计算机发展趋势如何?答:计算机发展趋势是巨型化、微型化、网络化和智能化4、被看好的未来计算机是那几类?答:科学界看好的未来计算机目前有生物计算机、光子计算机和量子计算机。
5、什么是计算机?答、计算机也称为电脑,是用来处理数字、文字、图形图像、声音等各种形式信息的一种电子设备。
操作系统基本操作

1
第3章 操作系统
•本章从操作系统的基本理论知识和基本操作 入手,对Windows XP的功能和使用方法进行 了详细介绍。通过本章的学习,应掌握操作 系统的基本概念,能熟练掌握Windows XP所 提供的功能,管理好计算机资源,更好地为 其他程序的运行服务。
2
学习目标
【Alt + Esc】
以项目打开的顺序 循环切换
Windows XP的常用快捷键
20
Windows XP的文件和文件夹管理 1.文件和文件夹 2.文件和文件夹的操作 3.资源管理器
21
文件和文件夹的操作
1.新建文件或文件夹 2.打开及关闭文件或文件夹 3.选定文件或文件夹 4.复制、移动文件或文件夹 5.删除、恢复文件或文件夹 6.重命名文件或文件夹 7.搜索文件或文件夹 8.文件和文件夹快捷方式的创建 9.文件或文件夹属性的查看
22
资源管理器
“Windows资源管理器”是用于管理计算机所 有资源的应用程序。通过资源管理器可以运行程 序、打开文档、新建、删除文件、移动和复制文 件、启动应用程序、连接网络驱动器、打印文档 和创建快捷方式,还可以对文件进行搜索、归类 和属性设置。
23
1.打开资源管理器 • 单击【开始】按钮,选择“所有程序”的“附 件”级联菜单中的“Windows资源管理器”命 令。 • 右击“我的电脑”图标,在弹出的快捷菜单中 选择“资源管理器”命令。 • 右击【开始】按钮,在弹出的快捷菜单中选择 “资源管理器”命令。 • 在“我的电脑”窗口中,单击工具栏上的【文 件夹】按钮。
46
3.音量控制
如果计算机系统配置了多媒体装置,那么 就可以使用“音量控制”程序调节计算机或其 他多媒体应用程序所播放声音的音量、平衡和 高低音等设置,如下图所示。
计算机基本理论基础知识总汇

计算机基本理论基础知识总汇计算机基本理论基础知识总汇1、计算机按照数据处理规模大小可以分为(巨型计算机)(大型计算机)(小型计算机)(微型计算机)(工作站)等2、计算机的硬件主要由(控制器)(运算器)(存储器)(输入输出设备)以及电源等硬件组成。
3、计算机主机是(控制器)(运算器)(存储器)的总称,主要包括(CPU)(内存)(主板)等部件。
4、控制器和运算器集成在一起,合称为(中央处理器)5、CPU是(Central Processing Unit)的缩写。
6、计算机硬件系统可以分为两大部分,即(主机)和(外部设备)7、外部设备存储器包括(硬盘)(光盘)(U盘)8、1971年,每个Intel成功的把(算术运算器)和(逻辑运算器)集成在一起,发明了世界上第一块微处理器9、计算机可以分为(硬件)和(软件)两大部分10、运算器是信息的加工和处理部件,它的主要功能是完成(算术)运算和(逻辑)运算。
11、运算器除了能进行各种加、减、乘、除运算外,还可以进行(逻辑运算)12、运算器主要由(算术运算单元)(寄存器)(累加器)等组成13、控制器主要由(指令译码器)(指令寄存器)(控制逻辑部件)等组成14、(运算器)和(控制器)集成在一起就是通常所讲的CPU15、(中央处理器)和(内存储器)一起被称为主机16、存储器是计算机汇总记忆设备,用来存放(数据)和(程序)17、CPU内部(缓存)的大小以及(速度)对CPU的性能影响很大。
18、存储器一般可以分为(内部存储器)和(外部存储器)两大类19、一般把计算机的输入输出设备称为(外部设备)20、计算机软件是指为了(运行)(管理)和(维护)计算机系统所编制的各种程序的总和。
21、计算机软件可分为(系统软件)和一般(应用软件)22、一般把计算机数据总线包含的二进制位数称为(字长)23、计算机的(运算速度)是衡量计算机性能的主要指标,它主要取决于指令的(执行时间)24、CPU的总线包括(数据)(地址)和(控制)25、CPU一般由(逻辑运算)单元、(控制)单元和(存储)单元组成。
计算机基本理论基础知识总汇

计算机基本理论基础知识总汇计算机科学是一门研究计算机原理、算法、数据结构以及计算机应用的学科。
在学习计算机科学的过程中,了解计算机基本理论基础知识是非常重要的。
本文将对计算机基本理论基础知识进行总结,并提供一些实际应用的例子,帮助读者更好地理解这些概念。
一、计算机科学概述计算机科学的主要研究内容包括计算机原理、算法、数据结构、编程语言、操作系统等。
它涉及了计算机内部的工作原理,以及计算机在各种应用领域的使用。
1. 计算机的工作原理计算机是由硬件和软件两部分组成的。
硬件包括处理器、内存、存储器、输入设备和输出设备等。
软件包括系统软件和应用软件。
计算机通过执行程序来进行各种操作,包括输入数据、处理数据和输出结果。
2. 算法和数据结构算法是解决问题的方法和步骤的描述,它是计算机程序的核心。
数据结构是组织和存储数据的方式,它关注数据元素之间的关系和操作。
算法和数据结构对于计算机科学的研究具有重要意义,能够提高计算机程序的效率和质量。
3. 编程语言和编程范式编程语言是计算机与人进行交互的工具。
常见的编程语言包括C、C++、Java、Python等。
编程范式是一种编程的思维方式和方法论,常见的编程范式有面向过程编程、面向对象编程、函数式编程等。
选择合适的编程语言和编程范式能够提高程序的可读性和可维护性。
4. 操作系统操作系统是计算机系统的核心软件,它负责管理计算机的硬件资源和提供各种服务。
常见的操作系统有Windows、Linux和Mac OS,它们提供了图形界面和命令行界面来进行操作。
二、计算机网络计算机网络是将多台计算机连接起来,实现数据和资源共享的系统。
了解计算机网络的基本原理对于理解互联网和进行网络编程非常重要。
1. 网络通信原理计算机网络通过使用协议来实现网络通信。
常见的网络协议有TCP/IP协议,它是互联网的基础协议。
网络通信过程包括数据的分组、路由选择、传输和重组等。
2. 互联网互联网是全球范围内的计算机网络系统,它包括了许多网络和子网络。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Chapter 1 Introduction1.Abstract View of System Components2.Multiprogrammed Batch SystemsSeveral jobs are kept in main memory at the same time, and theCPU is multiplexed among them.Chapter 2: Computer-System Structuresputer-System Architecture2. Interrupt Time Line For a Single Process Doing Output3.Moving-Head Disk Mechanism4.Direct Memory Access StructureSix Step Process to Perform DMA Transfer 5.Storage-Device Hierarchye of A Base and Limit Register7.Hardware Address ProtectionChapter 3: Operating-System Structures 1.MS-DOS Execution2.MS-DOS Layer StructureChapter 4: Processes1.Diagram of Process State2.Process Control Block (PCB)3.CPU Switch From Process to Process4.Representation of Process Scheduling5.Addition of Medium Term SchedulingChapter 5: Threads 1.Single and Multithreaded Processes2.Many-to-One Model3.One-to-one Model4.Many-to-Many ModelChapter 6: CPU Scheduling1.Alternating Sequence of CPU And I/O Bursts2.First-Come, First-Served (FCFS) SchedulingProcess Burst TimeP124P2 3P3 3●Suppose that the processes arrive in the order: P1 , P2 , P3The Gantt Chart for the schedule is:●Waiting time for P1= 0; P2= 24; P3 = 27●Average waiting time: (0 + 24 + 27)/3 = 173.Example of Non-Preemptive SJFProcess Arrival Time Burst TimeP10.0 7P2 2.0 4P3 4.0 1P4 5.0 4●SJF (non-preemptive)●Average waiting time = (0 + 6 + 3 + 7)/4 - 44.Example of Preemptive SJFProcess Arrival Time Burst TimeP10.0 7P 2 2.0 4P 3 4.0 1P 4 5.0 4● SJF (preemptive)● Average waiting time = (9 + 1 + 0 +2)/4 - 35.Example of RR with Time Quantum = 20 Process Burst TimeP 1 53P 2 17P 3 68P 4 24● The Gantt chart is:● Typically, higher average turnaround than SJF, but better response .6.Dispatch LatencyChapter 7: Process Synchronization 1.Implementation • Semaphore operations now defined aswait (S ):S.value--;if (S.value < 0) {add this process to S.L;block;} signal (S ):S.value++;if (S.value <= 0) {remove a process P from S.L;wakeup(P);}2.Deadlock•– two or more processes are waiting indefinitely for an event that can be caused by only one of the waiting processes.•Let S and Q be two semaphores initialized to 1P0P1wait(S); wait(Q);wait(Q); wait(S);signal(S); signal(Q);signal(Q) signal(S);3.Bounded-Buffer Problem•Shared datasemaphore full, empty, mutex;Initially:full = 0, empty = n, mutex = 1Problem Producer Processdo {…produce an item in nextp…wait(empty);wait(mutex);…add nextp to buffer…signal(mutex);signal(full);} while (1);Problem Consumer Processdo {wait(full)wait(mutex);…remove an item from buffer to nextc…signal(mutex);signal(empty);…consume the item in nextc…} while (1);4.Readers-Writers Problem•Shared datasemaphore mutex, wrt;Initiallymutex = 1, wrt = 1, readcount = 0 Writer Processwait(wrt);…writing is performed…signal(wrt);Reader Processwait(mutex);readcount++;if (readcount == 1)wait(rt);signal(mutex);…reading is performed…wait(mutex);readcount--;if (readcount == 0)signal(wrt);signal(mutex):5.Dining-Philosophers Problem•Shared datasemaphore chopstick[5];Initially all values are 1•Philosopher i:do {wait(chopstick[i])wait(chopstick[(i+1) % 5])…eat…signal(chopstick[i]);signal(chopstick[(i+1) % 5]);…think…} while (1);Chapter 8: Deadlocks1.Example of a Resource Allocation Graph2.Basic Facts•If graph contains no cycles ⇒ no deadlock.•If graph contains a cycle ⇒–if only one instance per resource type, then deadlock.–if several instances per resource type, possibility of deadlock.3.Safe State•When a process requests an available resource, system must decide if immediate allocation leaves the system in a safe state.•System is in safe state if there exists a safe sequence of all processes.•Sequence <P1, P2, …, P n> is safe if for each P i, the resources that Pi can still request can be satisfied by currently available resources + resources held by all the P j, with j<I.–If P i resource needs are not immediately available, then P i can wait until all P j have finished.–When P j is finished, P i can obtain needed resources, execute, return allocated resources, and terminate.–When P i terminates, P i+1 can obtain its needed resources, and so on.4.Banker’s Algorithm•Multiple instances.•Each process must a priori claim maximum use.•When a process requests a resource it may have to wait.•When a process gets all its resources it must return them in a finite amount of time. Data Structures for the Banker’s AlgorithmLet n = number of processes, and m = number of resources types.•Available:Vector of length m. If available [j] = k, there are k instances of resource type R j available.•Max: n x m matrix. If Max [i,j] = k, then process P i may request at most k instances of resource type R j.•Allocation: n x m matrix. If Allocation[i,j] = k then P i is currently allocated k instances of R j.•Need: n x m matrix. If Need[i,j] = k, then P i may need k more instances of R j to completeits task.Need [i,j] = Max[i,j] –Allocation [i,j].Safety Algorithm1) Let Work and Finish be vectors of length m and n, respectively. Initialize:Work = AvailableFinish [i] = false for i - 1,3, …, n.2) Find and i such that both:(a) Finish [i] = false(b) Need i≤WorkIf no such i exists, go to step 4.3) Work = Work + Allocation iFinish[i] = truego to step 2.4) If Finish [i] == true for all i, then the system is in a safe state.Resource-Request Algorithm for Process P iRequest = request vector for process P i. If Request i[j] = k then process P i wants k instances of resource type R j.1) If Request i≤Need i go to step 2. Otherwise, raise error condition, since process has exceeded its maximum claim.2) If Request i≤Available, go to step 3. Otherwise P i must wait, since resources are not available.3) Pretend to allocate requested resources to P i by modifying the state as follows:Available = Available = Request i;Allocation i= Allocation i + Request i;Need i= Need i–Request i;;•If safe ⇒ the resources are allocated to P i.•If unsafe ⇒P i must wait, and the old resource-allocation state isrestored5.Example of Banker’s Algorithm• 5 processes P0 through P4; 3 resource types A(10 instances),B (5instances, andC (7 instances).•Snapshot at time T0:•Allocation Max Available• A B C A B C A B C•P0 0 1 0 7 5 3 3 3 2•P1 2 0 0 3 2 2•P2 3 0 2 9 0 2•P3 2 1 1 2 2 2•P40 0 2 4 3 3•T he content of the matrix. Need is defined to be Max – Allocation.•Need• A B C•P0 7 4 3•P1 1 2 2•P2 6 0 0•P30 1 1•P4 4 3 1•T he system is in a safe state since the sequence < P1, P3, P4, P2, P0> satisfies safety criteria.Chapter 9: Memory Management1.Multistep Processing of a User2.Dynamic relocation using a relocation register3.Overlays for a Two-Pass4.Schematic View of Swapping5.Hardware Support for Relocation and Limit Registers6.Address Translation Architecture7.Paging Hardware With TLB8.Valid (v) or Invalid (i) Bit In A Page TableChapter 10: Virtual Memory 1.Transfer of a Paged Memory to Contiguous Disk Space2.Steps in Handling a Page Fault3.First-In-First-Out (FIFO) Algorithm•Reference string: 1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5• 3 frames (3 pages can be in memory at a time per process)• 4 framesFIFO Replacement –Belady’s Anomaly–more frames ⇒ less page faultsOptimal Page ReplacementLeast Recently Used (LRU) AlgorithmChapter 11: File-System Interface1.Sequential-access File2.Access Lists and Groups●Mode of access: read, write, execute●Three classes of usersRWXa) owner access7 ⇒ 1 1 1RWXb) group access 6 ⇒1 1 0RWXc) public access 1 ⇒0 0 1●Ask manager to create a group (unique name), say G, and add some users to the group.For a particular file (say game) or subdirectory, define an appropriate access.Chapter 12: File System Implementationyered File System2. A Typical File Control Block3.In-Memory File System StructuresChapter 13: I/O Systems1.Interrupt-Driven I/O CycleChapter 14: Mass-Storage SystemsDisk Scheduling●Several algorithms exist to schedule the servicing of disk I/O requests.●We illustrate them with a request queue (0-199).98, 183, 37, 122, 14, 124, 65, 67Head pointer 531.FCFSIllustration shows total head movement of 640 cylinders.2.SSTFIllustration shows total head movement of 236 cylinders.3.SCANIllustration shows total head movement of 208 cylinders.4.C-SCAN5.C-LOOK6.MS-DOS Disk Layout§1.True-False Questions: (Please answer with ╳or√)( )1.Only one process can be in the state of running on any processor at any time.√( )2.Context-switch time is not overhead; the system still can do useful work while switching. ╳( )3.There is at least one thread belongs to a running process. √( )4.Many-to-one model provides more concurrency than the one-to-one threading model. √( )5.All processes, either I/O-bound or CPU-bound, must perform I/O formeaningful execution. √( )6.CPU scheduling deals with the problem of deciding which of the processes located in the hard disk is to be allocated the CPU. ╳( )7.FCFS is a kind of preemptive scheduling algorithm. ╳( )8.SJF is optimal – gives minimum average waiting time for a given set of processes √( )9.With multilevel queue scheduling, the RoundRobin should be used in the foreground for the interactive processes. √( )10.It is better to determine where the program will reside in memory before loading than making this decision until program execution.╳( )11.The logical and physical addresses are the same in compile-time andload-time address binding but different in execution-time address binding.√( )12.With memory management unit (MMU), the user program never sees the real physical addresses.√( )13.With overlay, the system is able to keep all the necessary instructions and data in memory at all time.╳( )14.Multiprogramming is impossible in fixed-sized partition because each process may require different sized memory space.√( )15.It is possible for paging scheme to generate external fragmentation, while the internal fragmentation is inevitable.√( )16.Both associative registers and page tables can be searched simultaneously.╳( )17. A bad page replacement choice increases the page-fault rate and slows process execution, but this will bot affect the correct execution of theprocesses.╳( )18.The working-set window should be fixed within the execution of a particular program.╳( )19.SSTF scheduling is a form of SJF scheduling; may cause starvation of some requests.√( )20.Since OS is only software, the changes in the design of the hardware has no influence on i╳t.( )21.When a process executes, it typically executes for a long time before it either finishes or needs to perform I/O.√( )22.Random access memory (RAM) can only be accessed by CPU, no other device can directly communicate with it.╳( )23.Being another kind of processor, device controllers cannot executeconcurrently with the CPU.╳( )24.The concept of cache memory can be applied only between CPU andmemory in the storage device hierarchy.√( )25. A program is a passive entity and a process is an active entity with a program counter specifying the next instruction to execute.√( )26.The execution of a process is not necessarily to be sequential. √( )27.With layered approach, an operating system can be debugged and verified without any concern for the lower layer. ╳( )28.During system design, although mechanisms are strongly affecting policies, it is better to separate the policy from the mechanism. √( )29.Two processes associated with same program are considered the same separate execution sequences. ╳( )30.There are five states a process can be in, and only one process can be in running state at any instance.√( )31.The long-term scheduler selects which processes should be brought in to the ready queue. √( )32.Context-switch time is an overhead because the system cannot do useful work while switching. √( )33.The parent processes and the children processes created by the parent can be executed concurrently. √( )34.There will be no race condition when the instructions involved can be executed atomically. ╳( )35.When one thread is executing inside its critical section, all other threads should stop running and wait. ╳( )36.Without proper control, it is possible for two processes to be in their critical sections at the same time. √( )37.When solving critical section problems, we could make possible assumption concerning the relative speed of the threads. ╳( )38.Semaphores can be implemented as synchronization tool that does not require busy waiting. √( )39. A system built with semaphores cannot guarantee mutual exclusion. ╳( )40. A semaphore is always as powerful as a monitor and it always has value 0 or 1. ( )41.Deadlock prevention differs from avoidance because deadlock avoidance make deadlock impossible. √( )42.If the processes in the system has no hold-and-wait condition, no deadlock can happen. √( )43.In order to prevent deadlock, there is no other ways except ensuring no cycle can happen in the resource allocation graph associated with this system. ╳( )44.It is impossible for a system with deadlock prevention scheme to become deadlocked. ╳( )45.If a resource-allocation graph contains cycle, that means this system isdeadlocked. ╳( )ually deadlock recovery method should be invoked before deadlock detection.√( )47.The system will not become deadlocked even the system has reached an unsafe state. √( )48.Overlay can be used when the entering process is larger than amount of memory allocated to it. √( )49. A process must be completely idle before swapping, particularly with pending I/O.√§2 Multiple Choices, Single Answer Questions: (Please answer with capital letter( )1.Which of the following should not be contained in the stack of a process as temporary data?(A) method parameters (B) return addresses (C) global variables (D) localvariables( )2.Which of the following is not one of the information associated with a process in its process control block (PCB)? B(A) CPU registers (B) kernel (C) program counter (D) process state (E) I/O status ( )3.There are many scheduling queues associated with the processes running in a system, which are job queue, _______ queue, and device queues. A(A) ready queues (B) I/O queues (C) port queues (D) routine queues( )4.The selection of a process in the ready queue for entering the CPU for execution is called D(A) send (B) detach (C) transmit (D) dispatch( )5.The selection of a process to bring into the ready queue is happeninginfrequently, therefore, the execution of the ______-term scheduler may beslow. C(A) Short (B) medium (C) long (D) immediate( )6.When two processes wish to communicate, they need to establish a____________ between them before they can exchange messages. A(A) communication link (B) bridge (C) channel (D) password( )7.Which of the following should not be shared between threads? B(A) Code section (B) register set (C) Data section (D) other resources ( )8.Which of the following should not be one of the multithreading models? B(A) Many-to-one model (B) One-to-many model (C) One-to-one model (D)Many-to-many model( )9.In a system that do not support multiple kernel threads, we should use the _____________ model. B(A) Many-to-one (B) One-to-many (C) One-to-one (D) Many-to-many ( )10.For the criteria of CPU scheduling, which of the following is matching the goal of CPU utilization, throughput, turnaround time, and waiting time, respectively. C(A) max, min, max, min (B) min, max, max, min (C) max, max, min, min (D)min, min, max, max( )11.FCFS scheduling has convoy effect because many ______ processes waiting for one ______ process to get off the CPU. C(A) long, short (B) long, long (C) short, long (D) short, short( )12.SJF associates with each process the length of its next ______ to schedule the process. B(A) I/O interval (B) CPU burst (C) total process execution (D) program( )13.SJF cannot be implemented at the level of _______-term CPU scheduling. B(A) short (B) long (C) medium (D) temporary( )14.Dynamic loading D(A) is useful for executing small size code. (B) is better for frequentlyneeded program. (C) is loading the routine before it is needed. (D) obtaina better memory space utilization.( )15.In fixed-sized partition, the degree of multiprogramming is directly related to the number of ________ in the memory. E(A) CPUs (B) printers (C) registers (D) variables (E) partitions( )16.Suppose there are 40k, 50k, and 30k holes (in addressing sequence) left in the memory, which hole a 30k program will be allocated if first-fit, best-fit,and worst fit is used? (following the sequence) B(A) 50k, 30k, 40k (B) 40k, 30k, 50k (C) 40k, 50k, 30k (D) 30k, 40k, 50k ( )17.Alghough page table cannot be searched simultaneously, it uses the _________ property to locate the frame number in corresponding tableentry with one memory access. C(A) ordering (B) numbering (C) indexing (D) normalized( )18.Working set strategy prevents thrasing while keeping the degree ofmultiprocessing as _____ as possible. A(A) high (B) low (C) deep (D) short (E) long( )19.Two major determining factors of disk access time is the seek time and the __________. C(A) around time (B) feedback time (C) rotational latancy (D) executiontime (E) wait time( )20.There are four components comprise a computer system, including hardware, __________, application programs, and users. D(A) CPU (B) Windows (C) Hard disk (D) Operating Systems( )21.In multiprogrammed batch systems, several jobs are kept in main memory at the same time, and the CPU is _____________ among them. A(A) multiplexed (B) distributed (C) selecting (D) in-line (E) off-loaded ( )22.Which program loads the operating system into the memory? E(A) kernel (B) spooling (C) I/O (D) control (E) bootstrap( )23.Operating system is ___________ driven. D(A) data (B) signal (C) message (D) interrupt (E) software( )24.Device controller transfers blocks of data from buffer storage directly to main memory without CPU intervention is called D(A) Cycle stealing (B) Memory protection (C) Buffering (D) Directmemory access( )25.The only large storage media that the CPU can access directly is A(A) main memory (B) control storage (C) flash memory (D) hard disk(E) associative memory( )26.The greatest advantage by dividing operating system into layers is D(A) flexibility (B) convenience (C) effectiveness (D) modularity (E) easeof control( )27. A process includes its text section, ___________, program counter and stacks.D(A) data section (B) queue (C) memory (D) registers (E) variables( )28.The context of a process is represented in the _______of a process. B(A) kernel (B) PCB (C) control storage (D) queue( )29. A semaphore is an __________ that can only be accessed via two indivisible operations: P and V. D(A) condition variable (B) monitor variable (C) concurrent variable (D)integer variable( )30.The value of a _________ semaphore can range between 0 and 1. B(A) constant (B) binary (C) counting (D) fixed( )31.Deadlock avoidance scheme requires that the system has some additional_________ information available. C(A) detailed (B) structure (C) a priori (D) database( )32.Banker’s algorithm is a kind of B(A) Deadlock Recovery (B) Deadlock Avoidance (C) Deadlock Detection(D) Deadlock Prevention( )33.When obtaining the wait-for graph form the resource-allocation graph, thenodes of type _________ is removed. A(A) resource (B) process (C) lock (D) request( )34.Which of the following strategies does not need to search the entire list of freeholes before applying it? A(A) first fit (B) best fit (C) worst fit (D) better fit( )35.The allocated memory may be slightly larger than requested memory; this sizedifference causes B(A) medium fragmentation (B) internal fragmentation (C) externalfragmentation (D) patched fragmentation§3. Fill-in-the-blank Questions:( )1. A process can be temporarily brought out of memory to a backing store, andthen brought back into memory for continued execution. This is called____________( )2.________-fit and ________-fit better than worst-fit in terms of speed andstorage utilization.( )3.It requires _______ memory accesses for every instruction access if the pagetable is placed in main memory.( )4.When referencing the memory, the ________________should be searchedfirst and the page table next.( )5.It is important to keep the page-fault rate ________ in a demand-pagingsystem.( )6.OPT is difficult to implement since it requires ______ knowledge of thereference string( )7. A page is busy swapping pages in and out is called ____________.( )8.________ algorithm is also called “elevator algorithm”?§4. Short Answer Question:( )1.Suppose there are three processes entering the queue in the order specifiedbelow. The arrival time and the next CPU burst time are provided below. Pleasecalculate the average waiting time if using FCFS , SJF (preemptive version), andRoundRobin scheduling (with time quantum = 10). You need to show the detailof your calculation and complete the Gantt Chart below to demonstrate theexecution sequence.( )2.Consider following sequence of request queue for disk I/O0 20 40 60 80 0 20 40 6035, 53, 92, 43, 15 With disk head originally at cylinder 40, draw the paths of head movement by SSTF, SCAN and C-LOOK scheduling and find out their total head movement distances. SSTF: SCAN:(current head direction: right) C-LOOK: (reading direction:right) ( )3.Complete the logical address layout below showing a 32-bit machine with 16K page size. Show the layout If two-level paging is used, with 8 bits for the outer page. Calculate the size of the page table for each case. ( ) ( ) (8) ( ) ( ) ( )4.Consider the paging scheme with associative registers on the right. Please fill-in the page table and the associative registers with proper numbers. ( )5.Evaluate FIFO and LRU page replacement algorithm by running it on the memory reference string below and completing the tables provided. Compare the number of page faults resulted. Reference string: 5, 2, 0, 4, 2, 3, 4, 5, 2 ( )6. Please complete the state transition diagram on the right.( )7.A solution to the critical-section problem must satisfy three requirements: ____________, ____________, ____________. ( )8.The classical definition of P and V operation of semaphore is given below. eliminated the problem of busy waiting. P(S) { V(S) { while S ≤ 0 S++; ; // no-op; } S--; } ( )9. Fill-in the blanks provided in the diagram on。