Deck 15: Windows Operating Systems

Full screen (f)
exit full mode
Question
At the operating system level, file mapping is typically used for file caching, loading, and running executable programs.
Use Space or
up arrow
down arrow
to flip the card.
Question
A replacement policy determines which virtual page must be removed from memory to make room for a new page.
Question
Much of Windows is written in assembly language, a programming language that's standardized and readily available.
Question
One of the biggest concerns about Windows operating systems in general is the need for aggressive patch management to combat the many viruses and worms that target these systems.
Question
To give fast response times when dealing with CPU-bound applications, all that is required is fast hardware.
Question
The I/O Manager allows device drivers and file systems, which it perceives as device drivers, to be loaded dynamically based on the needs of the user.
Question
The Open Mode attribute for a file indicates whether other callers can open the file for read, write, or delete operations while this caller is using it.
Question
In 1999, Microsoft changed the operating system's name from Windows NT to Windows 2000.
Question
The SMB protocol is a high-level specification for formatting messages to be sent across the network and correlates to the application layer (layer 7), and the presentation layer (layer 6) of the OSI model.
Question
LDAP is the hierarchical replicated naming service on which the Internet is built.
Question
To ensure the integrity of the Windows operating system code the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called "protected subsystems."
Question
Windows XP was the last Windows operating system built on the Windows 95 code.
Question
In the Windows operating systems, almost all low-level I/O operations are asynchronous.
Question
The primary file handling concept in current versions of Windows is the virtual file.
Question
Windows provides execution environments for applications that are different from its primary programming interface.
Question
Windows is a non-preemptive-multitasking, multithreaded operating system.
Question
A driver object can only have one device connected to it.
Question
The lower half of the virtual address space is accessible only to kernel-mode processes.
Question
The first Windows application was not a true operating system.
Question
Multithreading is advantageous when doing database searches because data is retrieved faster when the system has several threads of execution that are searching an array simultaneously, especially if each thread has its own CPU.
Question
A thread is the entity within a process that the ____ schedules for execution.

A) thread manager
B) thread scheduler
C) process scheduler
D) kernel
Question
The code that must access processor-dependent data structures and registers is contained in small ____ that can be replaced by similar code for different processors.

A) segments
B) routines
C) modules
D) functions
Question
Kerberos provides authentication, data integrity, and data privacy.
Question
The ____ file system called can recover from all types of errors including those that occur in critical disk sectors.

A) FAT
B) NTFS
C) CDFS
D) NFST
Question
The portion of memory that is used for sections of the kernel that require maximum performance is ____.

A) The lower part of the resident operating system code
B) The middle part of the resident operating system code
C) The upper part of the resident operating system code
D) The highest portion of memory
Question
In processor management, the ____ is what actually executes the code.

A) thread
B) heap
C) global variable
D) environment string
Question
When physical memory becomes full, the ____ Memory Manager pages some of the memory contents to disk, freeing physical memory for other processes.

A) Application
B) Virtual
C) Backup
D) Physical
Question
In a Windows device driver, the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.

A) initialization routine
B) dispatch routine
C) start I/O routine
D) unload routine
Question
The first widely adopted Windows product, ____, featured a standardized look and feel, similar to the one made popular by Apple's Macintosh computer.

A) Windows 1.0
B) Windows 3.0
C) Windows 3.1
D) Windows for Workgroups
Question
The ____ policy determines when the pager copies a page from disk to memory.

A) placement
B) replacement
C) fetch
D) paging
Question
The primary programming interface for Windows is ____.

A) Win32 API
B) MS-DOS
C) POSIX
D) CDFS
Question
Windows does not provide much support for users who do not speak and read English.
Question
Whenever an error occurs, either the operating system or the processor issues an exception call, which automatically invokes the ____ that is appropriate to handle the condition, ensuring that no harm is done to either user programs or the system.

A) error processor
B) exception module
C) exception hierarchy
D) exception handling code
Question
Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.
Question
To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____.

A) extensibility, portability, reliability, compatibility, and performance
B) security, portability, reliability, and performance
C) security, expandability, compatibility, and cost-effectiveness
D) portability, interoperability, and performance
Question
A(n) ____ is a data structure that controls how the I/O operation is processed at each step.

A) ITB
B) IMS
C) IRP
D) IRQ
Question
For users who are faster with the keyboard than with a pointing device, Windows provides many keyboard shortcuts.
Question
In Windows terminology, the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode.

A) server
B) kernel
C) internal
D) computer
Question
A standard utility program called Internet Explorer contains directory and file display tools and a file finding tool.
Question
The ____ version of Windows introduced X.500-style directory services, Kerberos security, and improved Distributed Component Object Model (DCOM).

A) Windows NT Server version 4.0
B) Windows 2000 Server
C) Windows Server 2003
D) Windows Server 2005
Question
____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.

A) Memory-mapped
B) Virtual memory
C) Virtual system
D) Cached
Question
The Windows Task Manager is opened by pressing and holding the ____ keys.

A) Ctrl, W, and T
B) Ctrl, Alt, and Esc
C) Ctrl, Alt, and Delete
D) Alt and Tab
Question
The ____ creates a driver object when a driver is loaded into the system and then calls the driver's initialization routine.

A) Driver Manager
B) Driver Routine
C) I/O Manager
D) I/O Routine
Question
An API called ____ interface is used to pass I/O requests structured in the SMB format to a remote computer.

A) MS-SMB
B) SMBAPI
C) NetAPI
D) NetBIOS
Question
When processing a typical I/O request, ____ happens first.

A) Transport drivers process the request and place it on the network.
B) An I/O request packet is sent to the redirector.
C) User-mode software issues a remote I/O request.
D) The I/O Manager creates an I/O request packet.
Question
Active Directory groups machines into administrative units called ____.

A) domains
B) sites
C) networks
D) nodes
Question
____ provide a high-level interface for passing data between two processes regardless of their locations.

A) Sink caches
B) Named pipes
C) Memory-mapped I/O
D) Mailslots
Question
The ____ attribute indicates whether to delete the file after closing it.

A) share mode
B) open mode
C) disposal mode
D) file disposition
Question
To start an application from the Windows desktop, users ____ on an application icon or select it from the Start menu.

A) press SHIFT and click
B) double-click
C) press CTRL and click
D) click once
Question
In Windows, programs perform I/O on virtual files, manipulating them by using file ____.

A) maps
B) handles
C) pointers
D) references
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Windows Operating Systems
1
At the operating system level, file mapping is typically used for file caching, loading, and running executable programs.
True
2
A replacement policy determines which virtual page must be removed from memory to make room for a new page.
True
3
Much of Windows is written in assembly language, a programming language that's standardized and readily available.
False
4
One of the biggest concerns about Windows operating systems in general is the need for aggressive patch management to combat the many viruses and worms that target these systems.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
To give fast response times when dealing with CPU-bound applications, all that is required is fast hardware.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
The I/O Manager allows device drivers and file systems, which it perceives as device drivers, to be loaded dynamically based on the needs of the user.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The Open Mode attribute for a file indicates whether other callers can open the file for read, write, or delete operations while this caller is using it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
In 1999, Microsoft changed the operating system's name from Windows NT to Windows 2000.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The SMB protocol is a high-level specification for formatting messages to be sent across the network and correlates to the application layer (layer 7), and the presentation layer (layer 6) of the OSI model.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
LDAP is the hierarchical replicated naming service on which the Internet is built.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
To ensure the integrity of the Windows operating system code the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called "protected subsystems."
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Windows XP was the last Windows operating system built on the Windows 95 code.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
In the Windows operating systems, almost all low-level I/O operations are asynchronous.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
The primary file handling concept in current versions of Windows is the virtual file.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Windows provides execution environments for applications that are different from its primary programming interface.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Windows is a non-preemptive-multitasking, multithreaded operating system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
A driver object can only have one device connected to it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
The lower half of the virtual address space is accessible only to kernel-mode processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
The first Windows application was not a true operating system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Multithreading is advantageous when doing database searches because data is retrieved faster when the system has several threads of execution that are searching an array simultaneously, especially if each thread has its own CPU.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
A thread is the entity within a process that the ____ schedules for execution.

A) thread manager
B) thread scheduler
C) process scheduler
D) kernel
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The code that must access processor-dependent data structures and registers is contained in small ____ that can be replaced by similar code for different processors.

A) segments
B) routines
C) modules
D) functions
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Kerberos provides authentication, data integrity, and data privacy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The ____ file system called can recover from all types of errors including those that occur in critical disk sectors.

A) FAT
B) NTFS
C) CDFS
D) NFST
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The portion of memory that is used for sections of the kernel that require maximum performance is ____.

A) The lower part of the resident operating system code
B) The middle part of the resident operating system code
C) The upper part of the resident operating system code
D) The highest portion of memory
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
In processor management, the ____ is what actually executes the code.

A) thread
B) heap
C) global variable
D) environment string
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
When physical memory becomes full, the ____ Memory Manager pages some of the memory contents to disk, freeing physical memory for other processes.

A) Application
B) Virtual
C) Backup
D) Physical
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
In a Windows device driver, the ____ is used by the I/O Manager to communicate with the driver when it generates an IRP after an I/O request.

A) initialization routine
B) dispatch routine
C) start I/O routine
D) unload routine
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
The first widely adopted Windows product, ____, featured a standardized look and feel, similar to the one made popular by Apple's Macintosh computer.

A) Windows 1.0
B) Windows 3.0
C) Windows 3.1
D) Windows for Workgroups
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ policy determines when the pager copies a page from disk to memory.

A) placement
B) replacement
C) fetch
D) paging
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The primary programming interface for Windows is ____.

A) Win32 API
B) MS-DOS
C) POSIX
D) CDFS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Windows does not provide much support for users who do not speak and read English.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Whenever an error occurs, either the operating system or the processor issues an exception call, which automatically invokes the ____ that is appropriate to handle the condition, ensuring that no harm is done to either user programs or the system.

A) error processor
B) exception module
C) exception hierarchy
D) exception handling code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____.

A) extensibility, portability, reliability, compatibility, and performance
B) security, portability, reliability, and performance
C) security, expandability, compatibility, and cost-effectiveness
D) portability, interoperability, and performance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
A(n) ____ is a data structure that controls how the I/O operation is processed at each step.

A) ITB
B) IMS
C) IRP
D) IRQ
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
For users who are faster with the keyboard than with a pointing device, Windows provides many keyboard shortcuts.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
In Windows terminology, the privileged processor mode is called ____ mode and the nonprivileged processor mode is called user mode.

A) server
B) kernel
C) internal
D) computer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A standard utility program called Internet Explorer contains directory and file display tools and a file finding tool.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ version of Windows introduced X.500-style directory services, Kerberos security, and improved Distributed Component Object Model (DCOM).

A) Windows NT Server version 4.0
B) Windows 2000 Server
C) Windows Server 2003
D) Windows Server 2005
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.

A) Memory-mapped
B) Virtual memory
C) Virtual system
D) Cached
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
The Windows Task Manager is opened by pressing and holding the ____ keys.

A) Ctrl, W, and T
B) Ctrl, Alt, and Esc
C) Ctrl, Alt, and Delete
D) Alt and Tab
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
The ____ creates a driver object when a driver is loaded into the system and then calls the driver's initialization routine.

A) Driver Manager
B) Driver Routine
C) I/O Manager
D) I/O Routine
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
An API called ____ interface is used to pass I/O requests structured in the SMB format to a remote computer.

A) MS-SMB
B) SMBAPI
C) NetAPI
D) NetBIOS
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
When processing a typical I/O request, ____ happens first.

A) Transport drivers process the request and place it on the network.
B) An I/O request packet is sent to the redirector.
C) User-mode software issues a remote I/O request.
D) The I/O Manager creates an I/O request packet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Active Directory groups machines into administrative units called ____.

A) domains
B) sites
C) networks
D) nodes
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
____ provide a high-level interface for passing data between two processes regardless of their locations.

A) Sink caches
B) Named pipes
C) Memory-mapped I/O
D) Mailslots
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
The ____ attribute indicates whether to delete the file after closing it.

A) share mode
B) open mode
C) disposal mode
D) file disposition
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
To start an application from the Windows desktop, users ____ on an application icon or select it from the Start menu.

A) press SHIFT and click
B) double-click
C) press CTRL and click
D) click once
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
In Windows, programs perform I/O on virtual files, manipulating them by using file ____.

A) maps
B) handles
C) pointers
D) references
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.