Operating System

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
Across
  1. 3. The underlying hardware system that runs the virtual machines
  2. 5. A _____ can occur only if four necessary conditions hold simultaneously in the system
  3. 8. Creates and runs virtual machines by providing an interface that is identical to the host
  4. 9. A connection point that devices use to communicate with the machine
  5. 12. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
  6. 13. The terms _____ and cracker are for those attempting to breach security
  7. 16. _____ programs are associated with the operating system but are not necessarily part of the kernel
  8. 19. The advantages of distributed systems have resulted in an industry-wide trend toward _____
  9. 20. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
  10. 21. The user’s view of the computer varies according to the _____ being used
  11. 24. One program running at all times on the computer
  12. 26. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
  13. 27. memory that is dynamically allocated during process run time
  14. 30. A _____ kernel allows a process to be preempted while it is running in kernel mode.
  15. 32. Contains information about the file, including ownership, permissions, and location of the file contents
  16. 34. One measure of work is the number of processes that are completed per time unit
  17. 35. _____ parallelism involves distributing not data but tasks across multiple computing cores
  18. 36. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
  19. 39. An ____ file is a series of code sections that the loader can bring into memory and execute
  20. 41. _____ paging is commonly used in virtual memory systems
  21. 43. The _____ register holds the smallest legal physical memory address
  22. 44. Nonvolatile memory that is used like a hard drive
  23. 45. _____ objects include files, programs, and semaphores
  24. 47. With _____ loading, a routine is not loaded until it is called
  25. 49. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
  26. 50. Access to a page marked invalid causes a ____ fault
  27. 51. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
Down
  1. 1. The interpreter used for systems with multiple command interpreters to choose from
  2. 2. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
  3. 4. The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
  4. 6. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
  5. 7. The _____ register specifies the size of the range
  6. 10. based on the Berkeley Fast File System
  7. 11. A ____ crash normally cannot be repaired; the entire disk must be replaced
  8. 14. A _____ kernel does not allow a process running in kernel mode to be preempted
  9. 15. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
  10. 16. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
  11. 17. A ____ file is a sequence of characters organized into lines
  12. 18. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
  13. 22. A program in execution
  14. 23. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
  15. 25. Specifies a set of functions that are available to an application programmer
  16. 28. CPU _____ vary in number and type, depending on the computer architecture
  17. 29. _____ memory involves the separation of logical memory as perceived by users from physical memory
  18. 31. Communication links are controlled by special communication _____
  19. 33. The _____'s algorithm less efficient than the resource-allocation graph scheme
  20. 37. Is a complete round of communication
  21. 38. _____ objects include the CPU, memory segments, printers, disks, and tape drives
  22. 40. Protecting critical regions through the use of locks
  23. 42. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
  24. 46. The potential for a security violation, such as the discovery of a vulnerability
  25. 47. A protection _____ specifies the resources that the process may access
  26. 48. Each ____ process is provided with a virtual copy of the host