計(jì)算機(jī)科學(xué)-hw操作系統(tǒng)概念課后習(xí)題答案-ch10_第1頁(yè)
計(jì)算機(jī)科學(xué)-hw操作系統(tǒng)概念課后習(xí)題答案-ch10_第2頁(yè)
計(jì)算機(jī)科學(xué)-hw操作系統(tǒng)概念課后習(xí)題答案-ch10_第3頁(yè)
計(jì)算機(jī)科學(xué)-hw操作系統(tǒng)概念課后習(xí)題答案-ch10_第4頁(yè)
計(jì)算機(jī)科學(xué)-hw操作系統(tǒng)概念課后習(xí)題答案-ch10_第5頁(yè)
已閱讀5頁(yè),還剩7頁(yè)未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

ImportSettings:

BaseSettings:BrownstoneDefault

HighestAnswerLetter:D

MultipleKeywordsinSameParagraph:No

Chapter:Chapter10

MultipleChoice

L

AxA(n)fileisasequenceoffunctions,

/)

Btext

c\source

z)

DXobject

XIexecutable

Ar

:B

Feedback:10.1

Difficulty:Easy

z

A(n)fileisasequenceofbytesorganizedintoblocksunderstandablebythesystem's

Hn

AV不

-)

Btext

csource

Dxobject

7?executable

Ar

:C

Feedback:10.1

Difficulty:Easy

3.

A\A(n)fileisaseriesofcodesectionsthattheloadercanbringintomemoryandexecute,

7?

B\text

/!

c\source

/!

D\object

ZJexecutable

Ans:D

Feedback:10.1

Difficulty:Easy

4.Inanenvironmentwhereseveralprocessesmayopenthesamefileatthesametime,.

A)theoperatingsystemtypicallyusesonlyoneinternaltabletokeeptrackofopenfiles

B)theoperatingsystemtypicallyusestwointernaltablescalledthesystem-wideandper-disk

tablestokeeptrackofopenfiles

C)theoperatingsystemtypicallyusesthreeinternaltablescalledthesystem-wide,per-disk,

andper-partitiontablestokeeptrackofopenfiles

D)theoperatingsystemtypicallyusestwointernaltablescalledthesystem-wideand

per-processtablestokeeptrackofopenfiles

Ans:D

Feedback:10.1

Difficulty:Medium

5.Supposethattheoperatingsystemusestwointernaltablestokeeptrackofopenfiles.

ProcessAhastwofilesopenandprocessBhasthreefilesopen.Twofilesaresharedbetween

thetwoprocesses.Howmanyentriesareintheper-processtableofprocessA,theper-process

tableofprocessB,andthesystem-widetables,respectively?

A)5,5,5

B)2,3,3

C)2,3,5

D)2,3,1

Ans:B

Feedback:10.1

Difficulty:Difficult

6

Asharedlock.

A\

l

zbehaveslikeawriterlock

B\

J

/ensuresthatafilecanhaveonlyasingleconcurrentsharedlock

c\

7behaveslikeareaderlock

D\

l

zwillpreventallotherprocessesfromaccessingthelockedfile

A

r:C

Feedback:10.1

Difficulty:Easy

7

AXAnexclusivelock.

-Tbehaveslikeawriterlock

B\

ZJensuresthatafilecanhaveonlyasingleconcurrentsharedlock

ex

z)behaveslikeareaderlock

D

willpreventallotherprocessesfromaccessingthelockedfile

Ar

:A

Feedback:10.1

Difficulty:Easy

8.Thesimplestfileaccessmethodis.

A)sequentialaccess

B)logicalaccess

C)relativeaccess

D)directaccess

Ans:A

Feedback:10.2.1

Difficulty:Easy

9.AisusedonUNIXsystemsatthebeginningofsomefilestoroughlyindicatethetype

ofthefile.

A)fileextension

B)creatorname

C)hint

D)magicnumber

Ans:D

Feedback:10.1.3

Difficulty:Medium

lAoxWhichofthefollowingistrueofthedirect-accessmethod?

zl

BItisthemostcommonmodeofaccess.

J\

cZItallowsprogramstoreadandwriterecordsinnoparticularorder.

>\

D/Filesaremadeupofvariable-lengthrecords.

Itisnotagoodmethodforaccessinglargeamountsofdataquickly.

Ans:B

Feedback:10.2.2

Difficulty:Medium

U

Whichofthefollowingistrueofthetree-structureddirectorystructure?

A)Userscannotcreatetheirownsubdirectories.

B)Userscannotacquirepermissiontoaccessthefilesofotherusers.

C)

D)Directoriescansharesubdirectoriesandfiles.

ArItisthemostcommondirectorystructure.

D

Feedback:10.3.5

Difficulty:Medium

Anacyclic-graphdirectorystructure.

1A2x

l

Bzdoesnotallowthesharingoffiles.

allowsthesharingofsubdirectoriesandfiles.

c\

)

zislesscomplicatedthanasimpletree-structureddirectorystructure.

D\

l

yislessflexiblethanasimpletree-structureddirectorystructure.

Ans:B

Feedback:10.3.6

Difficulty:Medium

13.Thepathname/home/people/os-student/chap10.txtisanexampleof

A)arelativepathname

B)anabsolutepathname

C)arelativepathnametothecurrentdirectoryof/home

D)aninvalidpathname

Ans:B

Feedback:10.3.5

Difficulty:Medium

14,TheUNIXhiesystemuseswhichofthefollowingconsistencysemantics?

AWritestoanopenfilebyauserarenotvisibleimmediatelytootherusersthathavethefile

)atthesametime.

OP

BOnceafileisclosed,thechangesmadetoitarevisibleonlyinsessionsstartinglater.

)0Usersarenotallowedsharethepointerofcurrentlocationintothefile.

D)Writestoanopenfilebyauserarevisibleimmediatelytootherusersthathavethefileopen

atthesametime.

Ans:D

Feedback:10.5.3

Difficulty:Difficult

15A\Whichofthefollowingisakeypropertyofanimmutablefile?

zl

B\Thefilenamemaynotbereused.

/1

c\Thecontentsofthefilemaybealtered.

z)

D\Itisdifficulttoimplementinadistributedsystem.

/—Thefilenamemaybereused.

An

A

Feedback:10.5.3

Difficulty:Medium

16.Whichofthefollowingisnotconsideredaclassificationofusersinconnectionwitheach

file?

A)owner

B)currentuser

C)group

D)universe

Ans:B

Feedback:10.6.2

Difficulty:Easy

17.isasecure,distributednamingmechanism.

A)Lightweightdirectory-accessprotocol(LDAP)

B)Domainnamesystem(DNS)

C)Commoninternetfilesystem(CIFS)

D)Networkinformationservice(NIS)

Ans:A

Feedback:10.5

Difficulty:Medium

18.app.exeisanexampleofa(n).

A)batchfile

B)objectfile

C)executablefile

D)textfile

Ans:C

Feedback:10.1.3

Difficulty:Easy

19.Amountpointis.

A)arootofthefilesystem

B)alocationofasharedfilesystem

C)onlyappropriateforsharedfilesystems

D)thelocationwithinthefilestructurewherethefilesystemistobeattached.

Ans:D

Feedback:10.4

Difficulty:Medium

20.is/arenotconsideredadifficultywhenconsideringfilesharing.

A)Reliability

B)Multipleusers

C)Consistencysemantics

D)Remoteaccess

Ans:A

Feedback:10.5

Difficulty:Medium

21.Whichofthefollowingisnotconsideredafileattribute?

A)Name

B)Size

C)Resolution

D)Protection

Ans:C

Feedback:10.1.1

Difficulty:Easy

22.Thepathnameos-student/src/vm.cisanexampleof

A)arelativepathname

B)anabsolutepathname

C)arelativepathnametothecurrentdirectoryof/0S-Student

D)aninvalidpathname

Ans:A

Feedback:10.3.5

Difficulty:Medium

23.Whichofthefollowingstatementsregardingtheclient-servermodelistrue?

A)Aremotefilesystemmaybemounted.

B)Theclient-serverrelationshipisnotverycommonwithnetworkedmachines.

C)Aclientmayonlyuseasingleserver.

D)Theclientandserveragreeonwhichresourceswillbemadeavailablebyservers.

Ans:A

Feedback:10.5.2

Difficulty:Medium

Essay

24.Ifyouwerecreatinganoperatingsystemtohandlefiles,whatwouldbethesixbasicfile

operationsthatyoushouldimplement?

Ans:Thesixbasicfileoperationsinclude:creatingafile,writingafile,readingafile,

repositioningwithinafile,deletingafile,andtruncatingafile.Theseoperationscomprisethe

minimalsetofrequiredfileoperations.

Feedback:10.1.2

Difficulty:Medium

25.Whatarecommonattributesthatanoperatingsystemkeepstrackofandassociateswitha

file?

Ans:Theattributesofthefileare:1)thename——thehuman-readablenameofthefile,2)the

identifier-thenon-human-readabletagofthefile,3)thetypeofthefile,4)thelocationofthe

file,5)thefile'ssize(inbytes,words,orblocks),andpossiblythemaximumallowedsize,6)file

protectionthroughaccesscontrolinformation,and7)time,date,anduseridentification.

Feedback:10.1.1

Difficulty:Medium

26.Distinguishbetweenanabsolutepathnameandarelativepathname.

Ans:Anabsolutepathnamebeginsattherootandfollowsapathofdirectoriesdowntothe

specifiedfile,givingthedirectorynamesonthepath.Anexampleofanabsolutepathnameis

/home/osc/chap10/file.txt.Arelativepathnamedefinesapathfromthecurrentdirectory.Ifthe

currentdirectoryis/home/osc/,thentherelativepathnameof

chaplO/file.txtreferstothesamefileasintheexampleoftheabsolutepathname.

Feedback:10.3.5

Difficulty:Medium

27.Whatisthedifferencebetweenanoperatingsystemthatimplementsmandatorylocking

andonethatimplementsadvisoryfilelocking?

Ans:Mandatorylockingrequiresthattheoperatingsystemnotallowaccesstoanyfilethatis

locked,untilitisreleased,eveniftheprogramdoesnotexplicitlyaskforalockonthefile.An

advisoryfilelockingschemewillnotpreventaccesstoalockedfile,anditisuptothe

programmertoensurethatlocksareappropriatelyacquiredandreleased.

Feedback:10.1.2

Difficulty:Medium

28.Whataretheadvantagesofusingfileextensions?

Ans:Fileextensionsallowtheuserofthecomputersystemtoquicklyknowthetypeofafile

bylookingatthefile'sextension.Theoperatingsystemcanusetheextensiontodeterminehow

tohandleaparticularfile.

Feedback:10.1.3

Difficulty:Medium

29.Brieflyexplainthefunctionalityofextendedfileattributes.

Ans:Fileattributesaregeneralvaluesrepresentingthenameofafile,itsowner,size,and

permissions(tonameafew.)Extendedfileattributesrefertoadditionalfileattributessuchas

characterencoding,securityfeatures,andapplicationassociatedwithopeningthefile.

Feedback:10.1.4

Difficulty:Medium

30.Whydoallfilesystemssufferfrominternalfragmentation?

Ans:Diskspaceisalwaysallocatedinfixedsizedblocks.Wheneverafileiswrittentodisk,it

usuallydoesnotfitexactlywithinanintegernumberofblockssothataportionofablockis

wastedwhenstoringthefileontothedevice.

Feedback:10.1.5

Difficulty:Medium

31.Describethreecommonmethodsforremotefile-sharing.

Ans:Thefirstimplementedmethodinvolvesmanuallytransferringfilesbetweenmachinesvia

programslikeftp.Thesecondmajormethodusesadistributedfilesystem(DFS),inwhich

remotedirectoriesarevisiblefromalocalmachine.Inthethirdmethod,abrowserisneededto

accessremotefilesontheWorldWideWeb,andseparateoperations(essentiallyawrapperfor

ftp)areusedtotransferfiles.TheDFSmethodinvolvesamuchtighterintegrationbetweenthe

machinethatisaccessingtheremotefilesandthemachineprovidingthefiles.

Feedback:10.5

Difficulty:Medium

32.DescribehowtheUNIXnetworkfilesystem(NFS)recoversfromserverfailureina

remotefilesystem?

Ans:Inthesituationwheretheservercrashesbutmustrecognizethatithasremotelymounted

exportedfilesystemsandopenedfiles,NFStakesasimpleapproach,implementingastateless

DFS.Inessence,itassumesthataclientrequestforafilereadorwritewouldnothaveoccurred

unlessthefilesystemhadbeenremotelymountedandthefilehadbeenpreviouslyopen.The

NFSprotocolcarriesalltheinformationneededtolocatetheappropriatefileandperforinthe

requestedoperation,assumingthattherequestwaslegitimate.

Feedback:10.5.2

Difficulty:Difficult

33.Whataretheadvantagesanddisadvantagesofaccesscontrollists?

Ans:Accesscontrollistshavetheadvantageofenablingcomplexaccessmethodologies.The

mainproblemwithACLsistheirlength.Constructingthelistmaybeatedioustask.Space

managementalsobecomesmorecomplicatedbecausethedirectorysizeneedstobeofvariable

size.

Feedback:10.6.2

Difficulty:Medium

True/False

34.Windowssystemsemploymandatorylocking.

Ans:True

Feedback:10.1.2

Difficulty:Medium

35.Asageneralrule,UNIXsystemsemploymandatorylocks.

Ans:False

Feedback:10.1.2

Difficulty:Medium

36.Allfilesinasingle-leveldirectorymusthaveuniquenames.

Ans:True

Feedback:10.3.3

Difficulty:Easy

37.Arelativepathnamebeginsattheroot.

Ans:False

Feed

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論