Across
- 3. The _____ register specifies the size of the range
- 6. With _____ loading, a routine is not loaded until it is called
- 7. A ____ file is a sequence of functions, each of which is further organized as declarations followed by executable statements
- 9. _____ objects include files, programs, and semaphores
- 10. _____ programs are associated with the operating system but are not necessarily part of the kernel
- 12. The terms _____ and cracker are for those attempting to breach security
- 13. The _____ register holds the smallest legal physical memory address
- 15. A _____ kernel does not allow a process running in kernel mode to be preempted
- 18. An ____ file is a series of code sections that the loader can bring into memory and execute
- 20. A _____ program manages the execution of user programs to prevent errors and improper use of the computer
- 23. Is a complete round of communication
- 25. One measure of work is the number of processes that are completed per time unit
- 28. A protection _____ specifies the resources that the process may access
- 29. The operating system acts as the manager of many resources. In this context, we can view an operating system as a _____ allocator
- 30. A ____ crash normally cannot be repaired; the entire disk must be replaced
- 31. Access to a page marked invalid causes a ____ fault
- 34. The device ____ present a uniform device access interface to the I/O subsystem, much as system calls provide a standard interface between the application and the operating system
- 35. Nonvolatile memory that is used like a hard drive
- 36. Communication links are controlled by special communication _____
- 37. Whether the cores appear across CPU chips or within CPU chips, we call these systems _____ systems
- 40. _____ parallelism involves distributing not data but tasks across multiple computing cores
- 42. The _____'s algorithm less efficient than the resource-allocation graph scheme
- 43. To ensure the integrity of the data being shared, operating systems often provide system calls allowing a process to _____ shared data
- 45. We say that a system is _____ if its resources are used and accessed as intended under all circumstances
- 47. A _____ can occur only if four necessary conditions hold simultaneously in the system
- 49. The interpreter used for systems with multiple command interpreters to choose from
- 50. Specifies a set of functions that are available to an application programmer
Down
- 1. Creates and runs virtual machines by providing an interface that is identical to the host
- 2. One lock-order verifier, which works on BSD versions of UNIX such as FreeBSD
- 4. The potential for a security violation, such as the discovery of a vulnerability
- 5. A program in execution
- 6. The advantages of distributed systems have resulted in an industry-wide trend toward _____
- 8. _____ objects include the CPU, memory segments, printers, disks, and tape drives
- 11. Other forms of removable disks include CDs, DVDs, and Blu-ray discs as well as removable flash-memory devices known as flash _____
- 14. The _____ is the module that gives control of the CPU to the process selected by the short-term scheduler
- 16. A ____ file is a sequence of characters organized into lines
- 17. Contains information about the file, including ownership, permissions, and location of the file contents
- 19. ____ systems provide efficient and convenient access to the disk by allowing data to be stored, located, and retrieved easily
- 21. _____ paging is commonly used in virtual memory systems
- 22. The user’s view of the computer varies according to the _____ being used
- 24. Each ____ process is provided with a virtual copy of the host
- 26. A _____ kernel allows a process to be preempted while it is running in kernel mode.
- 27. Protecting critical regions through the use of locks
- 30. The underlying hardware system that runs the virtual machines
- 32. based on the Berkeley Fast File System
- 33. memory that is dynamically allocated during process run time
- 36. A connection point that devices use to communicate with the machine
- 38. CPU _____ vary in number and type, depending on the computer architecture
- 39. _____ memory involves the separation of logical memory as perceived by users from physical memory
- 41. The time it takes for the dispatcher to stop one process and start another running is known as the dispatch _____
- 44. One program running at all times on the computer
- 46. A set of wires and a rigidly defined protocol that specifies a set of messages that can be sent on the wires
- 48. _____ parallelism focuses on distributing subsets of the same data across multiple computing cores and performing the same operation on each core
