____ I/O accesses a block device as a simple array of blocks. Ans✓✓✓-Raw
____ is a symmetric stream cipher. Ans✓✓✓-RC4
____ is a thread library for Solaris that maps many user-level threads to one
kernel thread. Ans✓✓✓-Green threads
____ layer security generally has been standardized on IPSec. Ans✓✓✓-Network
____ operating systems are designed primarily to maximize resource utilization.
Ans✓✓✓-Mainframe
_____ allow operating system services to be loaded dynamically. Ans✓✓✓-
Modules
_____ is not considered a challenge when designing applications for multicore
systems. Ans✓✓✓-Ensuring there is a sufficient number of cores
_____ is not one of the major categories of system calls. Ans✓✓✓-Security
_____ is the algorithm implemented on most systems. Ans✓✓✓-LRU
_____ is the dynamic storage allocation algorithm that results in the largest
leftover hole in memory. Ans✓✓✓-Worst-fit
,_____ is the dynamic storage allocation algorithm that results in the smallest
leftover hole in memory. Ans✓✓✓-Best-fit
_____ is the method of binding instructions and data to memory performed by
most general-purpose operating systems. Ans✓✓✓-Execution time binding
_____ is/are not a technique for managing critical sections in operating systems.
Ans✓✓✓-Peterson's solution
_____ is/are not a technique for passing parameters from an application to a
system call. Ans✓✓✓-Cache memory
_____ occurs when a process spends more time paging than executing.
Ans✓✓✓-Thrashing
_____ provide(s) an interface to the services provided by an operating system.
Ans✓✓✓-System calls
______ allows a portion of a virtual address space to be logically associated with a
file. Ans✓✓✓-Memory mapping
______ allows a thread to run on only one processor. Ans✓✓✓-Processor affinity
______ is a mobile operating system designed for the iPhone and iPad. Ans✓✓✓-
iOS
, ________ allows the parent and child processes to initially share the same pages,
but when either process modifies a page, a copy of the shared page is created.
Ans✓✓✓-Copy-on-write
_________ involves distributing tasks across multiple computing cores. Ans✓✓✓-
Task parallelism
__________ is a set of software frameworks that provide additional services to
application developers. Ans✓✓✓-Middleware
A ____ can be used to prevent a user program from never returning control to the
operating system. Ans✓✓✓-timer
A ____ is a public key digitally signed by a trusted party. Ans✓✓✓-digital
certificate
A ____ provides an API for creating and managing threads. Ans✓✓✓-thread
library
A ____ virus changes each time it is installed to avoid detection by antivirus
software. Ans✓✓✓-polymorphic
A _____ is a private network connecting servers and storage units. Ans✓✓✓-
storage area network
A _____ is an example of a systems program. Ans✓✓✓-command interpreter