logistic_guy
Senior Member
- Joined
- Apr 17, 2024
- Messages
- 1,072
Match the answers with their questions.
\(\displaystyle \bold{1.}\) What is the main difficulty a programmer faces when writing an operating system for a real-time environment?
\(\displaystyle \bold{2.}\) Why are caches useful, and what problems do they solve? Why not make a cache as large as the device it is caching?
\(\displaystyle \bold{3.}\) What are the three primary functions of an operating system?
\(\displaystyle \bold{4.}\) In what situations is it acceptable for an operating system to “waste” resources, and why is this not really wasteful?
\(\displaystyle \bold{5.}\) Should an operating system include applications like web browsers and email clients? Argue for both sides.
\(\displaystyle \bold{6.}\) What are two difficulties that could arise with an operating system protected by a memory partition that cannot be modified by either the user job or the OS itself?
\(\displaystyle \bold{7.}\) How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security) system?
\(\displaystyle \bold{8.}\) What are two possible uses of multiple modes of operation in CPUs?
\(\displaystyle \bold{9.}\) Which of the following instructions should be privileged?
\(\displaystyle \bold{10.}\) How can timers be used to compute the current time?
\(\displaystyle \bold{a.}\) It’s difficult to update the OS or fix bugs, and credentials cannot be stored securely.
\(\displaystyle \bold{b.}\) More modes can be used for advanced security and virtualization support.
\(\displaystyle \bold{c.}\) By suspending a process, saving its state, and using interrupts to track elapsed time once the process resumes.
\(\displaystyle \bold{d.}\) They improve performance by holding frequently used data closer to the processor, but their size is limited due to cost and power considerations.
\(\displaystyle \bold{e.}\) Managing fixed time constraints, optimizing performance, and ensuring processes run within the required time limits.
\(\displaystyle \bold{f.}\) It should include them for user convenience but risks bloating the system.
\(\displaystyle \bold{g.}\) To facilitate communication between the user and hardware, allocate resources fairly, and prevent improper use of system resources.
\(\displaystyle \bold{h.}\) Set value of timer, Clear memory, Modify entries in device-status table, Access I/O device, and Turn off interrupts.
\(\displaystyle \bold{i.}\) Kernel mode allows access to dangerous system resources, while user mode prevents access to them, thus protecting the system.
\(\displaystyle \bold{j.}\) In single-user systems where ease of use and better user interaction are more important than resource efficiency.
\(\displaystyle \bold{1.}\) What is the main difficulty a programmer faces when writing an operating system for a real-time environment?
\(\displaystyle \bold{2.}\) Why are caches useful, and what problems do they solve? Why not make a cache as large as the device it is caching?
\(\displaystyle \bold{3.}\) What are the three primary functions of an operating system?
\(\displaystyle \bold{4.}\) In what situations is it acceptable for an operating system to “waste” resources, and why is this not really wasteful?
\(\displaystyle \bold{5.}\) Should an operating system include applications like web browsers and email clients? Argue for both sides.
\(\displaystyle \bold{6.}\) What are two difficulties that could arise with an operating system protected by a memory partition that cannot be modified by either the user job or the OS itself?
\(\displaystyle \bold{7.}\) How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security) system?
\(\displaystyle \bold{8.}\) What are two possible uses of multiple modes of operation in CPUs?
\(\displaystyle \bold{9.}\) Which of the following instructions should be privileged?
\(\displaystyle \bold{10.}\) How can timers be used to compute the current time?
\(\displaystyle \bold{a.}\) It’s difficult to update the OS or fix bugs, and credentials cannot be stored securely.
\(\displaystyle \bold{b.}\) More modes can be used for advanced security and virtualization support.
\(\displaystyle \bold{c.}\) By suspending a process, saving its state, and using interrupts to track elapsed time once the process resumes.
\(\displaystyle \bold{d.}\) They improve performance by holding frequently used data closer to the processor, but their size is limited due to cost and power considerations.
\(\displaystyle \bold{e.}\) Managing fixed time constraints, optimizing performance, and ensuring processes run within the required time limits.
\(\displaystyle \bold{f.}\) It should include them for user convenience but risks bloating the system.
\(\displaystyle \bold{g.}\) To facilitate communication between the user and hardware, allocate resources fairly, and prevent improper use of system resources.
\(\displaystyle \bold{h.}\) Set value of timer, Clear memory, Modify entries in device-status table, Access I/O device, and Turn off interrupts.
\(\displaystyle \bold{i.}\) Kernel mode allows access to dangerous system resources, while user mode prevents access to them, thus protecting the system.
\(\displaystyle \bold{j.}\) In single-user systems where ease of use and better user interaction are more important than resource efficiency.