Question: Special files in Linux are used to represent Question 5 options: 1) the OS code 2) devices 3) i-nodes 4) the password file According to

Special files in Linux are used to represent

Question 5 options:

1)

the OS code

2)

devices

3)

i-nodes

4)

the password file

According to the discussion in Chapter 12, perfection is reached when

Question 6 options:

1)

nothing more can be added to the system

2)

nothing is in the system

3)

all system calls are implemented as library functions

Based on the discussion on Naming, which of the following statements is NOT true?

Question 7 options:

1)

Directories are used to map external names onto internal names.

2)

For a file in Unix, both its file name and its i-node number can be used internally.

3)

How to construct and manage the names for identifying the entities, such as files, processes, and devices etc., is an important issue in operating system design and implementation.

4)

External names are primarily designed for human beings to use while internal names are always used by the system.

Based on the discussion in Chapter 12, which of the following is considered as one of the guiding principles for the system call interface design?

Question 8 options:

1)

If a feature or system call cannot be implemented efficiently, that functionality is not useful and programs should not be using it.

2)

If a feature or system call might be useful in the future, it should be put in a user-level library, not in the operating system.

3)

Both (a) and (b)

4)

Neither (a) nor (b)

Which of the following statements is/are true?

Question 9 options:

1)

Figure 12.8 is an example that demonstrates space-time tradeoff

2)

Moores Law says that computer hardware improves by a factor of 100 every decade.

3)

Dijkstras THE system was the first layered operating system.

4)

All of the above

Based on the discussion in Chapter 12, which of the following is not one of the new system trends?

Question 10 options:

1)

Embedded systems.

2)

32-bit address based systems.

3)

Hypervisor based systems.

4)

Handheld wireless computers.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!