Across
- 2. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- 5. Specifies a set of functions that are
- 6. Contains information about the file, including ownership, permissions, and location of the file contents
- 7. The _____ register holds the smallest legal physical memory address
- 8. A connection point that devices use to communicate with the machine
- 10. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- 13. A _____ kernel allows a process to be preempted while it is running in kernel mode.
- 16. The potential for a security violation, such as the discovery of a vulnerability
- 18. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- 19. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- 21. A _____ can occur only if four necessary conditions hold simultaneously in the system
- 23. to an application programmer
- 24. The terms _____ and cracker are for those attempting to breach security
- 25. Creates and runs virtual machines by providing an interface that is identical to the host
- 27. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- 29. The underlying hardware system that runs the virtual machines
- 30. A _____ kernel does not allow a process running in kernel mode to be preempted
- 31. CPU _____ vary in number and type, depending on the computer architecture
- 33. _____ parallelism involves distributing not data but tasks across multiple computing cores
- 34. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- 35. One measure of work is the number of processes that are completed per time unit
- 39. One program running at all times on the computer
- 41. Protecting critical regions through the use of locks
- 44. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
- 45. _____ objects include files, programs, and semaphores
- 46. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- 48. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
Down
- 1. With _____ loading, a routine is not loaded until it is called
- 2. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- 3. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- 4. Each ____ process is provided with a virtual copy of the host
- 9. A ____ file is a sequence of characters organized into lines
- 11. An ____ file is a series of code sections that the loader can bring into memory and execute
- 12. _____ objects include the CPU, memory segments, printers, disks, and tape drives
- 14. based on the Berkeley Fast File System
- 15. Access to a page marked invalid causes a ____ fault
- 17. Is a complete round of communication
- 18. The _____'s algorithm less efficient than the resource-allocation graph scheme
- 20. _____ memory involves the separation of logical memory as perceived by users from physical memory
- 22. The advantages of distributed systems have resulted in an industry-wide trend toward _____
- 25. memory that is dynamically allocated during process run time
- 26. A program in execution
- 28. part of the kernel
- 29. A ____ crash normally cannot be repaired; the entire disk must be replaced
- 32. Nonvolatile memory that is used like a hard drive
- 36. Communication links are controlled by special communication _____
- 37. _____ paging is commonly used in virtual memory systems
- 38. The _____ register specifies the size of the range
- 40. A protection _____ specifies the resources that the process may access
- 42. The interpreter used for systems with multiple command interpreters to choose from
- 43. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- 47. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- 49. _____ programs are associated with the operating system but are not