Across
- 7. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- 9. A ____ file is a sequence of characters organized into lines
- 10. A connection point that devices use to communicate with the machine
- 11. The _____ register specifies the size of the range
- 12. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
- 14. The advantages of distributed systems have resulted in an industry-wide trend toward _____
- 19. _____ objects include the CPU, memory segments, printers, disks, and tape drives
- 21. _____ objects include files, programs, and semaphores
- 22. Contains information about the file, including ownership, permissions, and location of the file contents
- 24. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- 27. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
- 28. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- 29. _____ paging is commonly used in virtual memory systems
- 30. A _____ kernel allows a process to be preempted while it is running in kernel mode.
- 31. One measure of work is the number of processes that are completed per time unit
- 32. The interpreter used for systems with multiple command interpreters to choose from
- 35. An ____ file is a series of code sections that the loader can bring into memory and execute
- 36. CPU _____ vary in number and type, depending on the computer architecture
- 38. Protecting critical regions through the use of locks
- 41. With _____ loading, a routine is not loaded until it is called
- 44. The _____ register holds the smallest legal physical memory address
- 45. One program running at all times on the computer
- 46. Is a complete round of communication
- 47. Nonvolatile memory that is used like a hard drive
- 48. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- 50. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- 51. The _____'s algorithm less efficient than the resource-allocation graph scheme
Down
- 1. Access to a page marked invalid causes a ____ fault
- 2. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- 3. The underlying hardware system that runs the virtual machines
- 4. memory that is dynamically allocated during process run time
- 5. Each ____ process is provided with a virtual copy of the host
- 6. The terms _____ and cracker are for those attempting to breach security
- 8. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- 12. A protection _____ specifies the resources that the process may access
- 13. The potential for a security violation, such as the discovery of a vulnerability
- 15. A _____ kernel does not allow a process running in kernel mode to be preempted
- 16. The user’s view of the computer varies according to the _____ being used
- 17. A program in execution
- 18. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- 20. Specifies a set of functions that are available to an application programmer
- 23. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- 25. Communication links are controlled by special communication _____
- 26. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- 33. The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
- 34. A _____ can occur only if four necessary conditions hold simultaneously in the system
- 37. _____ memory involves the separation of logical memory as perceived by users from physical memory
- 39. _____ parallelism involves distributing not data but tasks across multiple computing cores
- 40. based on the Berkeley Fast File System
- 42. _____ programs are associated with the operating system but are not necessarily part of the kernel
- 43. A ____ crash normally cannot be repaired; the entire disk must be replaced
- 44. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- 49. Creates and runs virtual machines by providing an interface that is identical to the host