You are on page 1of 4

1.

The first widly adopted Windows product, ___, featured a standardized look an
d feel....
Windows 3.1
2. The ___ version of Windows introduced X.500-style directory services, kerbero
s security...
Windows 2000 Server
3. To accommodate the various needs or its user community, and to optimize resou
rces, the....
extensibility, portability, reliability, compatibility, and performance
4. In windows terminology, the privileged processor mode is called ___ mode and
the....
kernel
5. The code that must access processor-dependent data structures and registers i
s contained in small___
modules
6. Whenever an error occurs, either the operating system or the processor issues
an exception...
exception handling code
7. The primary programming interface for Windows is ___.
Win32 API
8. The ___ fiel system can recover from all types of errors including those that
occur in...
NTFS
9. When physical memory becomes full, the ___ Memory manager pages some of the m
emory....
Virtual
10. The portion of memory that is used for sections of the kernel that require m
aximum performance...
the lower part of the resident operating system code
11. The ___ policy determines when the pager copies a page from disk to memory.
fetch
12. A thread is the entity within a process that the ___ schedules for execution
.
kernel
13. in processor management, the ___ is what actually executes the code.
thread
14. a(n)___ is a data structure that controls how the I/O operation is processed
at each step.
IRP
15. In a Windows device driver, the ___ is used by the I/O manager to communicat
e with the...
dispatch routine
16. The ___ creates a driver object when a driver is loaded into the system and
then calls the....
I/O manager
17. In Windows, programs perform I/O on virtual files, manipulating them by usin
g file ___.
handles
18. The ___ attribute indicates whether to delete the file after closing it.
file disposition
19. ___ files exploit virtual memory capabilities by allowing an application to
open a file of arbitrary....
memory-mapped
20. ___ provide a high-level interface for passing data between two processes re
gardless of their locations.
Named pipes
21. When processing a typical remote I/O request, which of the following happens
first?
User-mode software issues a remote I/O request
22. An API called ___ interface is used to pass I/O requests structured in teh S
MB format to a remote computer.
NetBIOS
23. Active directory groups amchines into administrative units called ___.
domains
24. From the Start menu, users click ___ to go to a list of available applicatio
ns.
All Programs
25. The Windows Task Manager is opened by pressing and holding the ___ keys.
Ctrl, Alt, and Delete
26. The Fedora Project issues updates free to the public about every ___ months.
six
27. Fedora Core 2 was introduced in ___.
2004
28. Because Linux is written and distributed under the ___ General Public Licens
e, its source code is...
GNU
29. Linux terminal management conforms to ___ standards, and it also supports ps
eudo-terminals as...
POSIX
30. When a process begins execution, its segments have a ___ size.
fixed
31. The ___ device used in Linux memory management can be a partition on the dis
k or it can be a.....
swap
32. Virtual memory in Linux is managed using a multiple-level table hierarchy, w
hich accommodates...
32
33. Virtual memory management uses ___ levels of tables.
three
34. The process of grouping ands plitting usable memory is known as the ___.
buddy algorithm
35. The page replacement algorithm is an expanded version of the ___ replacement
policy.
clock page
36. In Linux the semaphore structure contains ___ fields.
three
37. Linux provides ___ queues and semaphores to allow two processes to synchroni
ze with each other.
wait
38. Only when all FIFO processes are completed does the scheduler proceed to exe
cute processes of ___ priority.
lower
39. Linux is ___, which improves its portability from one system to another.
device independent
40. In Linux device management, the ___ device number is used as an index to the
array to access...
major
41. The three standard classes of devices supported by Linux are ___.
character devices, block devices, and network devices.
42. In Linux, ___ devices cannot host a file system.
char
43. A file containing data or programs belonging to users is known as a(n)___.
ordinary file
44. The ___ represents the root directory.
/
45. Filenames that begin with one or two periods are considered ___ files.
hidden
46. In Linux, the ___ character in the Permissions column of a directory listing
describes the nature...
First
47. In Linux, the ___ command is used to change permissions on a file or directo
ry.
chmod
48. In Linux, information about the status of the system is available using the
___ monitor window.
system
49. Administrators use ___ logs that provide a detailed description of activity
on the system.
system
50. In Linux, the ___ log lists the statues of files that have been transferred
using a ftp service.
xferlog