Operating System

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
Across
  1. 2. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
  2. 5. Specifies a set of functions that are
  3. 6. Contains information about the file, including ownership, permissions, and location of the file contents
  4. 7. The _____ register holds the smallest legal physical memory address
  5. 8. A connection point that devices use to communicate with the machine
  6. 10. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
  7. 13. A _____ kernel allows a process to be preempted while it is running in kernel mode.
  8. 16. The potential for a security violation, such as the discovery of a vulnerability
  9. 18. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
  10. 19. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
  11. 21. A _____ can occur only if four necessary conditions hold simultaneously in the system
  12. 23. to an application programmer
  13. 24. The terms _____ and cracker are for those attempting to breach security
  14. 25. Creates and runs virtual machines by providing an interface that is identical to the host
  15. 27. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
  16. 29. The underlying hardware system that runs the virtual machines
  17. 30. A _____ kernel does not allow a process running in kernel mode to be preempted
  18. 31. CPU _____ vary in number and type, depending on the computer architecture
  19. 33. _____ parallelism involves distributing not data but tasks across multiple computing cores
  20. 34. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
  21. 35. One measure of work is the number of processes that are completed per time unit
  22. 39. One program running at all times on the computer
  23. 41. Protecting critical regions through the use of locks
  24. 44. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
  25. 45. _____ objects include files, programs, and semaphores
  26. 46. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
  27. 48. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
Down
  1. 1. With _____ loading, a routine is not loaded until it is called
  2. 2. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
  3. 3. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
  4. 4. Each ____ process is provided with a virtual copy of the host
  5. 9. A ____ file is a sequence of characters organized into lines
  6. 11. An ____ file is a series of code sections that the loader can bring into memory and execute
  7. 12. _____ objects include the CPU, memory segments, printers, disks, and tape drives
  8. 14. based on the Berkeley Fast File System
  9. 15. Access to a page marked invalid causes a ____ fault
  10. 17. Is a complete round of communication
  11. 18. The _____'s algorithm less efficient than the resource-allocation graph scheme
  12. 20. _____ memory involves the separation of logical memory as perceived by users from physical memory
  13. 22. The advantages of distributed systems have resulted in an industry-wide trend toward _____
  14. 25. memory that is dynamically allocated during process run time
  15. 26. A program in execution
  16. 28. part of the kernel
  17. 29. A ____ crash normally cannot be repaired; the entire disk must be replaced
  18. 32. Nonvolatile memory that is used like a hard drive
  19. 36. Communication links are controlled by special communication _____
  20. 37. _____ paging is commonly used in virtual memory systems
  21. 38. The _____ register specifies the size of the range
  22. 40. A protection _____ specifies the resources that the process may access
  23. 42. The interpreter used for systems with multiple command interpreters to choose from
  24. 43. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
  25. 47. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
  26. 49. _____ programs are associated with the operating system but are not