Operating System

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950
Across
  1. 3. The _____ register specifies the size of the range
  2. 6. With _____ loading, a routine is not loaded until it is called
  3. 7. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
  4. 9. _____ objects include files, programs, and semaphores
  5. 10. _____ programs are associated with the operating system but are not necessarily part of the kernel
  6. 12. The terms _____ and cracker are for those attempting to breach security
  7. 13. The _____ register holds the smallest legal physical memory address
  8. 15. A _____ kernel does not allow a process running in kernel mode to be preempted
  9. 18. An ____ file is a series of code sections that the loader can bring into memory and execute
  10. 20. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
  11. 23. Is a complete round of communication
  12. 25. One measure of work is the number of processes that are completed per time unit
  13. 28. A protection _____ specifies the resources that the process may access
  14. 29. The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
  15. 30. A ____ crash normally cannot be repaired; the entire disk must be replaced
  16. 31. Access to a page marked invalid causes a ____ fault
  17. 34. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
  18. 35. Nonvolatile memory that is used like a hard drive
  19. 36. Communication links are controlled by special communication _____
  20. 37. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
  21. 40. _____ parallelism involves distributing not data but tasks across multiple computing cores
  22. 42. The _____'s algorithm less efficient than the resource-allocation graph scheme
  23. 43. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
  24. 45. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
  25. 47. A _____ can occur only if four necessary conditions hold simultaneously in the system
  26. 49. The interpreter used for systems with multiple command interpreters to choose from
  27. 50. Specifies a set of functions that are available to an application programmer
Down
  1. 1. Creates and runs virtual machines by providing an interface that is identical to the host
  2. 2. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
  3. 4. The potential for a security violation, such as the discovery of a vulnerability
  4. 5. A program in execution
  5. 6. The advantages of distributed systems have resulted in an industry-wide trend toward _____
  6. 8. _____ objects include the CPU, memory segments, printers, disks, and tape drives
  7. 11. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
  8. 14. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
  9. 16. A ____ file is a sequence of characters organized into lines
  10. 17. Contains information about the file, including ownership, permissions, and location of the file contents
  11. 19. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
  12. 21. _____ paging is commonly used in virtual memory systems
  13. 22. The user’s view of the computer varies according to the _____ being used
  14. 24. Each ____ process is provided with a virtual copy of the host
  15. 26. A _____ kernel allows a process to be preempted while it is running in kernel mode.
  16. 27. Protecting critical regions through the use of locks
  17. 30. The underlying hardware system that runs the virtual machines
  18. 32. based on the Berkeley Fast File System
  19. 33. memory that is dynamically allocated during process run time
  20. 36. A connection point that devices use to communicate with the machine
  21. 38. CPU _____ vary in number and type, depending on the computer architecture
  22. 39. _____ memory involves the separation of logical memory as perceived by users from physical memory
  23. 41. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
  24. 44. One program running at all times on the computer
  25. 46. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
  26. 48. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core