Deck 6: An Introduction to System Software and Virtual Machines

Full screen (f)
exit full mode
Question
A(n) ____________________ character is displayed on screen to indicate that an operating system is waiting for input.
Use Space or
up arrow
down arrow
to flip the card.
Question
Assemblers, compilers, and interpreters are all examples of ____________________ services.
Question
All modern operating systems provide GUIs.
Question
Clients cannot perform local computations without access to the network.
Question
A single high-level language instruction is typically translated into many high-level language instructions._________________________
Question
One of the problems with machine language is that it uses binary.
Question
The variable used to determine the address of a given instruction or piece of data is called the program counter._________________________
Question
The user interfaces on the operating systems of the 1950s, 1960s, and 1970s were text oriented._________________________
Question
Machine language is a high-level programming language.
Question
It is the responsibility of the ____________________ to safeguard the password file that stores all valid user name/password combinations.
Question
____________________ labels increase the maintainability of a program.
Question
Machine language allows only numeric memory addresses.
Question
Each symbolic assembly language instruction is translated into one or more machine language instructions.
Question
Typically, all requests to a(n) ____________________ operating system are prioritized.
Question
For a program to run on a naked machine, it must be represented in decimal._________________________
Question
One of the services provided by pseudo-ops is program construction.
Question
Second-generation operating systems are called multiprogrammed operating systems._________________________
Question
Assembly language does not allow the use of symbolic operation codes.
Question
An interface prevents accidental damage to hardware, programs, and data.
Question
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.
Question
In ____ language, if we insert or delete an instruction, all memory addresses following that instruction will change.

A) assembly
B) machine
C) low-level programming
D) high-level programming
Question
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

A) op code table
B) assembler
C) loader
D) library
Question
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

A) iterative
B) conditional
C) sequential
D) transformer
Question
____ operation codes are restricted to be used in the operating system or other system software.

A) Privileged
B) User
C) Specialized
D) System
Question
The set of services and resources created by the system software and seen by the user is called a(n) ____ machine.

A) naked
B) virtual
C) assembler
D) Von Neumann
Question
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.

A) table
B) source
C) data
D) object
Question
A program written in assembly language is called the ____ program.

A) virtual
B) object
C) data
D) source
Question
A(n) ____ invokes a service of the assembler.

A) compiler
B) pseudo-op
C) loader
D) operation
Question
A machine language program is called the ____ program.

A) source
B) object
C) data
D) virtual
Question
____, such as text editors, are sometimes organized into collections called program libraries.

A) Programming tools
B) Office tools
C) Packages
D) Utilities
Question
System software acts as a(n) ____ between the users and the hardware.

A) translator
B) intermediary
C) tester
D) security agent
Question
Icons displayed on the screen are selected with a mouse and a button using a technique called ____.

A) windows interface
B) point-and-click
C) panel interface
D) command line
Question
Translators for ____ are called compilers.

A) assembly language
B) machine language
C) low-level languages
D) high-level languages
Question
A ____-generation operating system will typically be a parallel processing operating system that can efficiently manage computer systems containing tens, hundreds, or even thousands of processors.

A) second
B) third
C) fourth
D) fifth
Question
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.

A) op code mnemonic
B) comment
C) address field
D) label
Question
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

A) Von Neumann
B) modern
C) algorithmic
D) conditional
Question
The ____ hides from the user the messy details of underlying hardware.

A) interface
B) operating system
C) system software
D) machine code
Question
C++ and Java are examples of ____ languages.

A) low-level programming
B) high-level programming
C) machine
D) assembly
Question
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed
B) virtual
C) assembler
D) naked
Question
If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.

A) sequential
B) binary
C) op code
D) table
Question
What are the four tasks to be performed by an assembler?
Question
What are three major advantages to writing programs in assembly language rather than machine language?
Question
Describe four problems with machine language.
Question
How does a GUI communicate with a user?
Question
What is the single most important piece of system software on the computer? Discuss its function, and discuss at length its software packages that handle the requests of other programs.
Question
What is the most important task of the operating system?
Question
To make a Von Neumann computer usable, what must you create between the user and the hardware? What must this created item do?
Question
Explain what a real-time operating system does.Then give a detailed example.
Question
Briefly explain the function of the operating system as a security guard.
Question
List four responsibilities of the system software.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: An Introduction to System Software and Virtual Machines
1
A(n) ____________________ character is displayed on screen to indicate that an operating system is waiting for input.
prompt
2
Assemblers, compilers, and interpreters are all examples of ____________________ services.
language
3
All modern operating systems provide GUIs.
True
4
Clients cannot perform local computations without access to the network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
A single high-level language instruction is typically translated into many high-level language instructions._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
One of the problems with machine language is that it uses binary.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The variable used to determine the address of a given instruction or piece of data is called the program counter._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
The user interfaces on the operating systems of the 1950s, 1960s, and 1970s were text oriented._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Machine language is a high-level programming language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
It is the responsibility of the ____________________ to safeguard the password file that stores all valid user name/password combinations.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ labels increase the maintainability of a program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Machine language allows only numeric memory addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Each symbolic assembly language instruction is translated into one or more machine language instructions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Typically, all requests to a(n) ____________________ operating system are prioritized.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
For a program to run on a naked machine, it must be represented in decimal._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
One of the services provided by pseudo-ops is program construction.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Second-generation operating systems are called multiprogrammed operating systems._________________________
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Assembly language does not allow the use of symbolic operation codes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
An interface prevents accidental damage to hardware, programs, and data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
In a time-sharing system, a program can keep the processor until it initiates an I/O operation and has run for the maximum length of time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In ____ language, if we insert or delete an instruction, all memory addresses following that instruction will change.

A) assembly
B) machine
C) low-level programming
D) high-level programming
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

A) op code table
B) assembler
C) loader
D) library
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

A) iterative
B) conditional
C) sequential
D) transformer
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
____ operation codes are restricted to be used in the operating system or other system software.

A) Privileged
B) User
C) Specialized
D) System
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The set of services and resources created by the system software and seen by the user is called a(n) ____ machine.

A) naked
B) virtual
C) assembler
D) Von Neumann
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
After all the fields of an assembly language instruction have been translated into binary, the newly built machine language instruction and the address of where it is to be loaded are written out to a file called the ____ file.

A) table
B) source
C) data
D) object
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
A program written in assembly language is called the ____ program.

A) virtual
B) object
C) data
D) source
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
A(n) ____ invokes a service of the assembler.

A) compiler
B) pseudo-op
C) loader
D) operation
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A machine language program is called the ____ program.

A) source
B) object
C) data
D) virtual
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
____, such as text editors, are sometimes organized into collections called program libraries.

A) Programming tools
B) Office tools
C) Packages
D) Utilities
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
System software acts as a(n) ____ between the users and the hardware.

A) translator
B) intermediary
C) tester
D) security agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Icons displayed on the screen are selected with a mouse and a button using a technique called ____.

A) windows interface
B) point-and-click
C) panel interface
D) command line
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Translators for ____ are called compilers.

A) assembly language
B) machine language
C) low-level languages
D) high-level languages
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
A ____-generation operating system will typically be a parallel processing operating system that can efficiently manage computer systems containing tens, hundreds, or even thousands of processors.

A) second
B) third
C) fourth
D) fifth
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
In assembly language, a(n) ____ is a name, followed by a colon, placed at the beginning of an instruction.

A) op code mnemonic
B) comment
C) address field
D) label
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
The ____ problem-solving cycle involves inputting code to an assembler, translating it to machine language, loading it into a Von Neumann computer, and executing to produce answers to the problem.

A) Von Neumann
B) modern
C) algorithmic
D) conditional
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ hides from the user the messy details of underlying hardware.

A) interface
B) operating system
C) system software
D) machine code
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
C++ and Java are examples of ____ languages.

A) low-level programming
B) high-level programming
C) machine
D) assembly
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
A Von Neumann computer without any helpful user-oriented features is called a(n) ____ machine.

A) distributed
B) virtual
C) assembler
D) naked
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
If the op code table is sorted alphabetically, the ____ search algorithm is used to find an op code.

A) sequential
B) binary
C) op code
D) table
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are the four tasks to be performed by an assembler?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
What are three major advantages to writing programs in assembly language rather than machine language?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Describe four problems with machine language.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
How does a GUI communicate with a user?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What is the single most important piece of system software on the computer? Discuss its function, and discuss at length its software packages that handle the requests of other programs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
What is the most important task of the operating system?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
To make a Von Neumann computer usable, what must you create between the user and the hardware? What must this created item do?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain what a real-time operating system does.Then give a detailed example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Briefly explain the function of the operating system as a security guard.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
List four responsibilities of the system software.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.