Question

1. A mechanism by which other modules, such as I/O and memory, may interrupt the normal...

1. A mechanism by which other modules, such as I/O and memory, may interrupt the normal sequencing of the
processor is called (A) Communication (B) Trap (C) Interrupt (D) I/O (E) None of the above
2. A mode of operation that provides for the interleaved execution of two or more computer programs by a single
processor is called (A) Interrupt (B) Multi-programming (C) Multi-tasking (D) Multi-threading (E) None of the
above
3. Which of the following is a memory location in virtual memory? That location is on disk and at some times in
main memory. (A) Virtual address (B) Real address (C) IO space (D) Virtual IO (E) None of the above
4. A large kernel containing virtually the complete operating system, including scheduling, file system, device
drivers, and memory management is called (A) Macrokernel (B) Microkernel (C) Embedded kernel (D)
Monolithic kernel (E) None of the above
5. When an executing process is interrupted by the processor so that another process can be executed is called
Process (A) Termination (B) Preemption (C) Swapping (D) Rotation (E) None of the above
6. A mechanism that relates to an error or exception condition generated within the currently running process,
such as an illegal file access attempt, is called (A) Interrupt (B) Trap (C) Swapping (D) Pre-emption (E) None
of the above
7. Which of the following statement regarding interrupt is incorrect? (A) If no interrupts are pending, the
processor proceeds to the next fetch stage. (B) Interrupt usually involves some overhead. (C) In handling
multiple interrupts, the processor cannot disable other interrupts while an interrupt is being processed. (D)
When the processor transfers control to the interrupt service routine, it needs to save the Program Status Word
and the location of next instruction to be executed. (E) None of the above.

Homework Answers

Answer #1

1) answer is INTERRUPT Option c.because when interrupt is given it stops the normal sequence of functioning in I/O devices,memory..etc.

2) answer is MULTI-TASKING Option c.it means that the two or more programs are executed one by one by a single processor only and it can share the common processing resources like cpu,memory.

3) answer is VIRTUAL ADDRESS Option a.this can be defined as the space can be created to store the virtual memory allocations.it mentions that what it will be located.

4) answer is MONOLITHIC KERNEL Option d.kernel designs are divided based on how they manage the system calls and resources what they have.so out of these monolithic kernel can runs all operating system instructions in same address space for speed,and it also have device drivers and memory management also.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
1. An operating system is a. A resource manager b. A user application such as turbo...
1. An operating system is a. A resource manager b. A user application such as turbo t c. A collection of all software packages on the computer d. Another name of my computer including both hardware and software 2. X86 calling convention is about a. How parameters are transferred through stack b. How interrupt vectors are used to find handlers c. How to make a phone call on an x86 computer d. None of the above 3. Paging mechanisms helps...
C++ language 1. Programs with memory leaks a should be executed in a secure environment to...
C++ language 1. Programs with memory leaks a should be executed in a secure environment to prevent theft of data by hackers. b will eventually crash if allowed to execute for long periods of time. c should be compiled with a special compiler that detects and flags the memory leaks. d should be executed under an operating system that can dynamically plug the leaks. e none of these. 2. An  lvalue is a a value of type long. b a memory...
1. What is the mechanism used by an OS to regain control of the CPU? Group...
1. What is the mechanism used by an OS to regain control of the CPU? Group of answer choices A.firewall B.portal C. timer d. program counter 2. Oftentimes, CPU registers can be used Group of answer choices a to store values for reuse by other user programs b. none of the other answers are correct c. to pass parameters to the OS d. to save memory for storing programs 3. A Policy Group of answer choices a.is not likely to...
1.Which reaction mechanism is the most likely in the case of secondary haloalkanes and bulky hindered...
1.Which reaction mechanism is the most likely in the case of secondary haloalkanes and bulky hindered bases? A. SN1 reaction B, E1 reaction C. SN2 reaction D. E2 reaction 2. Which of the following compounds is most likely to induce an E2 reaction, with minimal competition from other E ans SN mechanisms? A. CH3O B. (CH3)3CO- C. HO- D. Cl- 3. In an E1 reaction, incoming base will attack: A.the hydrogen atom on the carbon adjacent to the carbocation center...
1. A plaintiff must have a ___ in the controversy in order to have ____ to...
1. A plaintiff must have a ___ in the controversy in order to have ____ to file suit. a. stake/standing b. bet/payout c. standing/stake d. lawyer/fee agreement e. friend/an order 2. An out of state Defendant who uses the roads of another state is deemed to have submitted to the _____of the state's courts a. clerks court powers b. jurisdiction of the probate court c. personal jurisdiction d. power of the industrial commission e. subpoena power 3. During a lawsuit,...
life science 2 thx a lot 1. Reservoirs of infection A. refer to the normal host...
life science 2 thx a lot 1. Reservoirs of infection A. refer to the normal host of the pathogen B. include cats, birds, rodent, livestock, and insects C. have spread diseases such as HIV, Ebola, Swine flu, and SARS D. all of the above 2. Viral epidemics began around 12,000 years ago A. when humans lived in isolation B. when humans developed more densely populated agricultural communities C. when human became hunter-gatherers D. when antibiotics were discovered 3. The number...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime and criminology? a. Law in action departs substantially from the ideal behavior of the law. b. Focusing only on legally criminalized behavior makes it impossible to consider the impact of gender, race, age and ethnicity. c. Legalistic definitions ignore acts that cause great harm. d. The legalistic model suggests that these are absolute standards for judging right and wrong. e. All of the above....
1. Guidelines to protect electronic medical records were developed by this organization in the United States...
1. Guidelines to protect electronic medical records were developed by this organization in the United States Group of answer choices a. Department of Health and Human Services b. Center for Disease Control and Prevention c. World Health Organization d. None of the above HIPAA regulations initially went effect this year Group of answer choices a. 2003 b. 1996 c. 2001 d. 2006 Privacy of medical records is addressed under Group of answer choices a. HIPAA, b. HITECH c. USA Patriot...
52. BMR stands for basic memory retention basal metabolic rate bregmatic myofascial release none of these...
52. BMR stands for basic memory retention basal metabolic rate bregmatic myofascial release none of these 53. The primary (not initial) fuel during endurance exercise is liver glycogen muscle glycogen fatty acids none of these 54. The human body consists of chemicals cells tissues none of these all of these 55. The main purpose of the digestive system is the breakdown of foods and waste elimination to supply oxygen and eliminate carbon dioxide reproduction and maintenance of sexual characteristics none...
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c....
Question 21 ​By default, most wireless networks are ____. a. ​secured by WEP b. ​password-locked c. ​secured by WPA or WPA2 d. ​left unsecured 1 points Question 22 ​Choosing Image Editing and Illustration Programs a. ​non-lossy b. ​linear c. ​bitmap d. ​vector 1 points Question 23 ​Computer-generated graphics come in two varieties: ____ and vector. a. ​linear b. ​raster c. ​angular d. ​digital 1 points Question 24 ​Currently, WWANs provide wireless connections to the Internet using ____ networks created by...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT