Operating System
Across
- 3. The underlying hardware system that runs the virtual machines
- 5. A _____ can occur only if four necessary conditions hold simultaneously in the system
- 8. Creates and runs virtual machines by providing an interface that is identical to the host
- 9. A connection point that devices use to communicate with the machine
- 12. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- 13. The terms _____ and cracker are for those attempting to breach security
- 16. _____ programs are associated with the operating system but are not necessarily part of the kernel
- 19. The advantages of distributed systems have resulted in an industry-wide trend toward _____
- 20. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- 21. The user’s view of the computer varies according to the _____ being used
- 24. One program running at all times on the computer
- 26. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- 27. memory that is dynamically allocated during process run time
- 30. A _____ kernel allows a process to be preempted while it is running in kernel mode.
- 32. Contains information about the file, including ownership, permissions, and location of the file contents
- 34. One measure of work is the number of processes that are completed per time unit
- 35. _____ parallelism involves distributing not data but tasks across multiple computing cores
- 36. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
- 39. An ____ file is a series of code sections that the loader can bring into memory and execute
- 41. _____ paging is commonly used in virtual memory systems
- 43. The _____ register holds the smallest legal physical memory address
- 44. Nonvolatile memory that is used like a hard drive
- 45. _____ objects include files, programs, and semaphores
- 47. With _____ loading, a routine is not loaded until it is called
- 49. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- 50. Access to a page marked invalid causes a ____ fault
- 51. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
Down
- 1. The interpreter used for systems with multiple command interpreters to choose from
- 2. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- 4. The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
- 6. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- 7. The _____ register specifies the size of the range
- 10. based on the Berkeley Fast File System
- 11. A ____ crash normally cannot be repaired; the entire disk must be replaced
- 14. A _____ kernel does not allow a process running in kernel mode to be preempted
- 15. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- 16. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- 17. A ____ file is a sequence of characters organized into lines
- 18. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- 22. A program in execution
- 23. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- 25. Specifies a set of functions that are available to an application programmer
- 28. CPU _____ vary in number and type, depending on the computer architecture
- 29. _____ memory involves the separation of logical memory as perceived by users from physical memory
- 31. Communication links are controlled by special communication _____
- 33. The _____'s algorithm less efficient than the resource-allocation graph scheme
- 37. Is a complete round of communication
- 38. _____ objects include the CPU, memory segments, printers, disks, and tape drives
- 40. Protecting critical regions through the use of locks
- 42. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- 46. The potential for a security violation, such as the discovery of a vulnerability
- 47. A protection _____ specifies the resources that the process may access
- 48. Each ____ process is provided with a virtual copy of the host