Deck 16: Linux Operating System

Full screen (f)
exit full mode
Question
Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.
Use Space or
up arrow
down arrow
to flip the card.
Question
Virtual memory is implemented in Linux through demand paging.
Question
The name Linux is a contraction of Linus and UNIX.
Question
Device drivers supervise the transmission of data between main memory and the local unit.
Question
In the Linux processor management system, SCHED_OTHER has the highest priority.
Question
Virtual memory in Linux is managed using a multiple-level table hierarchy, which accommodates both 64- and 32-bit architectures.
Question
Linux was developed by Dennis Ritchie, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor.
Question
When Linux allocates memory space, it allocates one GB of high-order memory to the kernel and three GB of memory to executing processes.
Question
Linux brought the speed, efficiency, and flexibility of UNIX to a small computer environment.
Question
To keep track of free and busy pages, Linux uses a system of page tables.
Question
Linux administrators have access to numerous standard utilities, eliminating the need to write special code.
Question
The first primary corporate supporter of Linux was Red Hat Linux, the world's leading Linux distributor until 2005.
Question
A page's middle directory contains pointers to its corresponding page table files.
Question
In Linux, each process is referenced by a descriptor, which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process.
Question
Linux powerful but it is expensive to own.
Question
The Fedora Project encourages continuation of open-source development of the Linux kernel.
Question
When a process requests pages, Linux loads them into disk.
Question
Linux was based on a version of UNIX but capitalized on the lessons learned over the previous twenty years of UNIX development.
Question
Linux is an open-source program.
Question
Linux offers memory protection based on the type of information stored in each region belonging to the address space of a program.
Question
In Linux the semaphore structure contains ____ fields.

A) two
B) three
C) four
D) five
Question
Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals as well as process control systems.

A) POSIX
B) SCSI
C) USB
D) DLL
Question
Because Linux is written and distributed under the ____ General Public License, its source code is freely distributed and available to the general public.

A) GPL
B) Open Publication
C) GNU
D) MPP
Question
Virtual memory in Linux is managed using a multiple-level table hierarchy, which accommodates both 64- and ____-bit architectures.

A) 32
B) 96
C) 128
D) 512
Question
Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.

A) exec
B) fork
C) wait
D) pause
Question
The page replacement algorithm is an expanded version of the ____ replacement policy.

A) clock page
B) clock
C) page clock
D) page
Question
Fedora Core 2 was introduced in ____.

A) 2003
B) 2004
C) 2005
D) 2006
Question
Linux is ____, which improves its portability from one system to another.

A) device unique
B) device portability
C) device dependent
D) device independent
Question
Filenames are not case sensitive in Linux.
Question
A path name can be either one name or a list of names separated by dashes.
Question
The Fedora Project issues updates free to the public about every ____ months.

A) two
B) four
C) six
D) eight
Question
All Linux files are organized in directories that are connected to each other in a treelike structure.
Question
Only when all FIFO processes are completed does the scheduler proceed to execute processes of ____ priority.

A) higher
B) lower
C) the highest
D) the lowest
Question
Virtual memory management uses ____ levels of tables.

A) two
B) three
C) four
D) five
Question
In Linux device management, the ____ device number is used as an index to the array to access the appropriate code for a specific device driver.

A) major
B) minor
C) unique
D) support
Question
When a process begins execution, its segments have a ____ size.

A) large
B) variable
C) small
D) fixed
Question
The ____ device used in Linux memory management can be a partition on the disk or it can be a normal file.

A) pointer
B) swap
C) page
D) database
Question
Information about the well-being of a Linux system is available using the System Monitor window.
Question
Filenames can include a space, however this can cause complications if you're running programs from the command line because a program named interview notes would be viewed as a command to run two files: interview and notes.
Question
The process of grouping and splitting usable memory is known as the ____.

A) process algorithm
B) grouping algorithm
C) buddy algorithm
D) group/split algorithm
Question
In Linux,, ____ devices cannot host a file system.

A) write
B) read
C) block
D) char
Question
In Linux, the ____ log lists the status of files that have been transferred using a ftp service.

A) boot.log
B) dmesg
C) xferlog
D) secure
Question
The ____ represents the root directory.

A) \
B) ..
C) ^
D) /
Question
In Linux, information about the well-being of the system is available using the ____ Monitor window.

A) System
B) File
C) Process
D) Resource
Question
In Linux, the ____ command is used to change permissions on a file or directory.

A) cd
B) chmod
C) cp
D) grep
Question
Filenames that begin with one or two periods are considered ____ files.

A) hidden
B) open
C) closed
D) public
Question
A file containing data or programs belonging to users is known as a(n) ____.

A) symbolic link
B) ordinary file
C) special file
D) named pipe
Question
Administrators use ____ logs that provide a detailed description of activity on the system.

A) file
B) directory
C) detailed
D) system
Question
In Linux, the ____ character in the Permissions column of a directory listing describes the nature of the folder entry.

A) first
B) second
C) third
D) last
Question
The three standard classes of devices supported by Linux are ____.

A) character devices, system devices, and network interfaces
B) system devices, block devices, and network interfaces
C) character devices, block devices, and network interfaces
D) character devices, block devices, and network devices
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 16: Linux Operating System
1
Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.
True
2
Virtual memory is implemented in Linux through demand paging.
True
3
The name Linux is a contraction of Linus and UNIX.
True
4
Device drivers supervise the transmission of data between main memory and the local unit.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
In the Linux processor management system, SCHED_OTHER has the highest priority.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Virtual memory in Linux is managed using a multiple-level table hierarchy, which accommodates both 64- and 32-bit architectures.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Linux was developed by Dennis Ritchie, who wanted to create an operating system to maximize the limited capabilities of the Intel 80386 microprocessor.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
When Linux allocates memory space, it allocates one GB of high-order memory to the kernel and three GB of memory to executing processes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Linux brought the speed, efficiency, and flexibility of UNIX to a small computer environment.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
To keep track of free and busy pages, Linux uses a system of page tables.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Linux administrators have access to numerous standard utilities, eliminating the need to write special code.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The first primary corporate supporter of Linux was Red Hat Linux, the world's leading Linux distributor until 2005.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
A page's middle directory contains pointers to its corresponding page table files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
In Linux, each process is referenced by a descriptor, which contains approximately fifteen fields describing the process attributes together with the information needed to manage the process.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Linux powerful but it is expensive to own.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
The Fedora Project encourages continuation of open-source development of the Linux kernel.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
When a process requests pages, Linux loads them into disk.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Linux was based on a version of UNIX but capitalized on the lessons learned over the previous twenty years of UNIX development.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
Linux is an open-source program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Linux offers memory protection based on the type of information stored in each region belonging to the address space of a program.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In Linux the semaphore structure contains ____ fields.

A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals as well as process control systems.

A) POSIX
B) SCSI
C) USB
D) DLL
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Because Linux is written and distributed under the ____ General Public License, its source code is freely distributed and available to the general public.

A) GPL
B) Open Publication
C) GNU
D) MPP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Virtual memory in Linux is managed using a multiple-level table hierarchy, which accommodates both 64- and ____-bit architectures.

A) 32
B) 96
C) 128
D) 512
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.

A) exec
B) fork
C) wait
D) pause
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
The page replacement algorithm is an expanded version of the ____ replacement policy.

A) clock page
B) clock
C) page clock
D) page
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Fedora Core 2 was introduced in ____.

A) 2003
B) 2004
C) 2005
D) 2006
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
Linux is ____, which improves its portability from one system to another.

A) device unique
B) device portability
C) device dependent
D) device independent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Filenames are not case sensitive in Linux.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
A path name can be either one name or a list of names separated by dashes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
The Fedora Project issues updates free to the public about every ____ months.

A) two
B) four
C) six
D) eight
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
All Linux files are organized in directories that are connected to each other in a treelike structure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Only when all FIFO processes are completed does the scheduler proceed to execute processes of ____ priority.

A) higher
B) lower
C) the highest
D) the lowest
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Virtual memory management uses ____ levels of tables.

A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
In Linux device management, the ____ device number is used as an index to the array to access the appropriate code for a specific device driver.

A) major
B) minor
C) unique
D) support
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
When a process begins execution, its segments have a ____ size.

A) large
B) variable
C) small
D) fixed
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ device used in Linux memory management can be a partition on the disk or it can be a normal file.

A) pointer
B) swap
C) page
D) database
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Information about the well-being of a Linux system is available using the System Monitor window.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Filenames can include a space, however this can cause complications if you're running programs from the command line because a program named interview notes would be viewed as a command to run two files: interview and notes.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
The process of grouping and splitting usable memory is known as the ____.

A) process algorithm
B) grouping algorithm
C) buddy algorithm
D) group/split algorithm
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
In Linux,, ____ devices cannot host a file system.

A) write
B) read
C) block
D) char
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
In Linux, the ____ log lists the status of files that have been transferred using a ftp service.

A) boot.log
B) dmesg
C) xferlog
D) secure
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
The ____ represents the root directory.

A) \
B) ..
C) ^
D) /
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
In Linux, information about the well-being of the system is available using the ____ Monitor window.

A) System
B) File
C) Process
D) Resource
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
In Linux, the ____ command is used to change permissions on a file or directory.

A) cd
B) chmod
C) cp
D) grep
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Filenames that begin with one or two periods are considered ____ files.

A) hidden
B) open
C) closed
D) public
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
A file containing data or programs belonging to users is known as a(n) ____.

A) symbolic link
B) ordinary file
C) special file
D) named pipe
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Administrators use ____ logs that provide a detailed description of activity on the system.

A) file
B) directory
C) detailed
D) system
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
In Linux, the ____ character in the Permissions column of a directory listing describes the nature of the folder entry.

A) first
B) second
C) third
D) last
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
The three standard classes of devices supported by Linux are ____.

A) character devices, system devices, and network interfaces
B) system devices, block devices, and network interfaces
C) character devices, block devices, and network interfaces
D) character devices, block devices, and network devices
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.