Operating System

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051
Across
  1. 7. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
  2. 9. A ____ file is a sequence of characters organized into lines
  3. 10. A connection point that devices use to communicate with the machine
  4. 11. The _____ register specifies the size of the range
  5. 12. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
  6. 14. The advantages of distributed systems have resulted in an industry-wide trend toward _____
  7. 19. _____ objects include the CPU, memory segments, printers, disks, and tape drives
  8. 21. _____ objects include files, programs, and semaphores
  9. 22. Contains information about the file, including ownership, permissions, and location of the file contents
  10. 24. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
  11. 27. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
  12. 28. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
  13. 29. _____ paging is commonly used in virtual memory systems
  14. 30. A _____ kernel allows a process to be preempted while it is running in kernel mode.
  15. 31. One measure of work is the number of processes that are completed per time unit
  16. 32. The interpreter used for systems with multiple command interpreters to choose from
  17. 35. An ____ file is a series of code sections that the loader can bring into memory and execute
  18. 36. CPU _____ vary in number and type, depending on the computer architecture
  19. 38. Protecting critical regions through the use of locks
  20. 41. With _____ loading, a routine is not loaded until it is called
  21. 44. The _____ register holds the smallest legal physical memory address
  22. 45. One program running at all times on the computer
  23. 46. Is a complete round of communication
  24. 47. Nonvolatile memory that is used like a hard drive
  25. 48. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
  26. 50. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
  27. 51. The _____'s algorithm less efficient than the resource-allocation graph scheme
Down
  1. 1. Access to a page marked invalid causes a ____ fault
  2. 2. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
  3. 3. The underlying hardware system that runs the virtual machines
  4. 4. memory that is dynamically allocated during process run time
  5. 5. Each ____ process is provided with a virtual copy of the host
  6. 6. The terms _____ and cracker are for those attempting to breach security
  7. 8. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
  8. 12. A protection _____ specifies the resources that the process may access
  9. 13. The potential for a security violation, such as the discovery of a vulnerability
  10. 15. A _____ kernel does not allow a process running in kernel mode to be preempted
  11. 16. The user’s view of the computer varies according to the _____ being used
  12. 17. A program in execution
  13. 18. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
  14. 20. Specifies a set of functions that are available to an application programmer
  15. 23. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
  16. 25. Communication links are controlled by special communication _____
  17. 26. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
  18. 33. The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
  19. 34. A _____ can occur only if four necessary conditions hold simultaneously in the system
  20. 37. _____ memory involves the separation of logical memory as perceived by users from physical memory
  21. 39. _____ parallelism involves distributing not data but tasks across multiple computing cores
  22. 40. based on the Berkeley Fast File System
  23. 42. _____ programs are associated with the operating system but are not necessarily part of the kernel
  24. 43. A ____ crash normally cannot be repaired; the entire disk must be replaced
  25. 44. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
  26. 49. Creates and runs virtual machines by providing an interface that is identical to the host