id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
os2.001&mcs&0&Y&Which one of the following best describes the purpose of an operating system?&Managing hardware and providing services to applications&Sorting large files;Managing on-line application development;Managing the tape library;&&&&a&undefined.0&&&&&1:v&&&N.
os2.002&mcs&0&Y&Which of the following IBM eServers use IRQs, I/O addresses, and DMAs as a way for the operating system to connect with the processor?&xSeries and Netfinity servers&iSeries and AS/400 servers;zSeries and S/390 servers;pSeries and RS/6000 platforms;&&&&a&undefined.0&&&&&1:v&&&N.
os2.003&mcs&0&N&Which of the following is a false statement?&System overhead for running a program in virtual memory is lower compared to running a program in real memory.&Very positive and practical results have been achieved with virtual memory environments because the 80/20 rule has proven to be reliable.;Virtual memory implementations help programmers.;&This statement is false. System overhead is higher managing virtual storage because of address translation and
;paging. &&&a&undefined.0&&&&&1:v&&&N.
os2.004&tf&0&Y&True or False? IBM eServer platforms are capable of handling concurrent transactions and providing sub-second response time, while running batch jobs to fill in any idle time.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.005&mcs&0&Y&Which one of the following did the material in this lesson suggest was a very popular and cost-effective security measure?&Passwords changed at regular intervals&Retina scanners;Card swipes;Security guards;&&&&a&undefined.0&&&&&1:v&&&N.
os2.006&mcs&0&Y&Your CIO says, "We have a lot of technology personnel who leave to pursue other opportunities. How can I be sure someone doesn't take some of our business files with them on their way out?" Click the best security rule to apply in this situation.&Restrict file access&Create an audit trail;Issue new user IDs once a month;Institute a multiple password system;&&&&a&undefined.0&&&&&1:v&&&N.
os2.007&mcs&0&Y&What kind of services does the operating system provide to coordinate shared resources and maintain the integrity of updated resources? &Serialization services&Timer services ;Locking services;Management services;&&&&a&undefined.0&&&&&1:v&&&N.
os2.008&tf&0&Y&True or False? The AIX kernel provides the ability to share resources simultaneously among many processes or threads and users.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.009&tf&0&Y&True or False? A computer's operating system workload can not be prioritized using preemptive multitasking. &TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.010&tf&0&N&True or False?
Virtual memory is used to optimize central storage.&TRUE&FALSE&This is true. Remember, the terms central memory, real memory, and main memory are used interchangeably.&&&&undefined.0&&&&&1&&&N.
os2.011&mcs&0&N&Virtual memory operating systems can keep what portion of a typical program in main memory and still meet
;service level objectives for the program?&20%&30%;50%;10%;&20% is a rule of thumb that could rise or fall depending on the program.&&&a&undefined.0&&&&&1:v&&&N.
os2.012&tf&0&Y&True or False?
One advantage of virtual memory is that it degrades the overall performance of the
;operating system. &FALSE&TRUE&The degrading of the overall performance of the operating system is a disadvantage.&&&&undefined.0&&&&&1&&&N.
os2.013&tf&0&Y&True or False? Additional memory can not help reduce or eliminate the effects of disk drag and its impact on
;overall system performance.&FALSE&TRUE&Additional memory can help reduce or eliminate the effects of disk drag and its impact on overall system
;performance&&&&undefined.0&&&&&1&&&N.
os2.014&tf&0&Y&True or False? One benefit of virtual memory is that when a large portion of the system is present in virtual memory, ongoing upgrades of main memory or expanded storage capacity improve the overall performance?&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.015&tf&0&Y&True or False? A subsystem makes the larger processing system operate slower and less efficiently.&FALSE&TRUE&The opposite is true, the subsystem makes the larger system operate more efficiently.&&&&undefined.0&&&&&1&&&N.
os2.016&mcs&0&Y&What is the opposite of batch processing?&Transaction processing&Automatic processing;Management processing;&&&&a&undefined.0&&&&&1:v&&&N.
os2.017&tf&0&Y&True or False? Hackers pose almost no threat to zSeries and s/390&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.018&mcs&0&Y&What is the most secure server?&zSeries&iSeries;UNIX;Windows;&&&&a&undefined.0&&&&&1:v&&&N.
os2.019&mcs&0&Y&What is the most widely used security technique?&Passwords&Retina scanners;Tracking;&&&&a&undefined.0&&&&&1:v&&&N.
os2.020&esa&0&&Main storage is also called ____ storage or real storage.¢ral&&Main storage is also called central storage or real storage.&&&&undefined.0&&&&&1&&&N.
os2.021&tf&0&N&The size of memory in main storage restricts how much work a computer can handle at once.&TRUE&FALSE&When computers were used in the 1960s, the limited supply of main storage (measured in kilobytes or
;
megabytes) restricted how much work a computer could handle at the same time. Large programs that
;consumed all available system memory prevented other programs from loading.&&&&undefined.0&&&&&1&&&N.
os2.022&esa&0&&Virtual memory acts like a larger version of ___ memory.&real&&Virtual memory acts like a larger version of real memory.&&&&undefined.0&&&&&1&&&N.
os2.023&esa&0&&____ memory is a logical view of storage.&Virtual&&Virtual memory is a logical view of storage.&&&&undefined.0&&&&&1&&&N.
os2.024&esa&0&&Virtual items can include the hardware, the I/O, ____, server, host, domain, and access methods.&storage&&Virtual items can include the hardware, the I/O, storage, server, host, domain, and access methods.&&&&undefined.0&&&&&1&&&N.
os2.025&esa&0&&Virtualization lets the system use ___ memory more efficiently.&main&&Virtualization lets the system use main memory more efficiently.&&&&undefined.0&&&&&1&&&N.
os2.026&tf&0&N&Virtualization lets programmers ignore the amount of main memory available.&TRUE&FALSE&Programmers can write programs without being concerned about how much central or main memory might be
;available.&&&&undefined.0&&&&&1&&&N.
os2.027&tf&0&&Virtualization comes at the price of demanding extra overhead. &TRUE&FALSE&Virtual memory degrades the overall performance of the operating system. The operating system needs extra
;overhead to manage storage mapping, address translation, and program section movement to and from main
;memory while the program is executing. Therefore, the system must be configured with enough memory and
;processor power to provide an acceptable level of performance.&&&&undefined.0&&&&&1&&&N.
os2.028&esa&0&N&The IBM i (formely iSeries and AS400) uses single-level virtual storage techniques and make no distinction
;between _____ storage and the main storage.&disk&&The IBM i uses virtual storage techniques through single-level storage. No distinction is made between disk
;storage and the main storage. Swapping occurs to move large amounts of data between main memory and the disk,
;even though a single-level storage view exists and performance penalties still apply. &&&&undefined.0&&&&&1&&&N.
os2.029&esa&0&&The z/OS can make ___ or explicit requests for virtual storage.&implicit&&Programmers on z/OS use the virtual storage area assigned to their job step by making implicit and explicit
;requests for virtual storage. Furthermore, z/OS will request virtual storage as needed to contain the
;control blocks required to manage active programs (tasks).&&&&undefined.0&&&&&1&&&N.
os2.030&tf&0&N&Programs executed in virtual memory pretend that they have unlimited central memory to work with.&TRUE&FALSE&Program developers work with the premise that sufficient main memory is available such that business
;
;applications don't have to manage shared memory space&&&&undefined.0&&&&&1&&&N.
os2.031&tf&0&N&Programs executed in virtual memory impair security by isolating the programs that are active at the same time,
;thus sharing main memory with one another.&FALSE&TRUE&Programs executed in virtual memory enhance security by isolating the programs that share main memory from
;
;one another.&&&&undefined.0&&&&&1&&&N.
os2.032&esa&0&&Since the cost of hardware continues to drop, while programmer salaries rise, making the computer do more
;of the work (increasing the ___) is a wise move.&overhead&&Virtual storage capability offers convenience to the program developer; however, this convenience comes
;with the penalty of system overhead. With the cost of personnel rising and the price of computer hardware
;falling, most developers agree that making this performance tradeoff is well worth the penalty.&&&&undefined.0&&&&&1&&&N.
os2.033&tf&0&&Excessive paging is one factor that can degrade a program’s performance.&TRUE&FALSE&How well or poorly a program actually performs in a virtual memory environment depends on its level of
;paging activity and on other complex factors.&&&&undefined.0&&&&&1&&&N.
os2.034&esa&0&&Virtual memory operating systems, such as z/OS, AIX, or IBM i, typically keep only the liveliest ___
;percent of a typical program in main memory&20&&Very positive and practical results have been achieved in virtual memory environments because the 80/20
;rule has proven to be workable.Virtual memory operating systems, such as z/OS, AIX, or IBM i, will
;typically keep only 20 percent of a typical program in main memory and still meet service level objectives
;(i.e. performance requirements) for the program.&&&&undefined.0&&&&&1&&&N.
os2.035&esa&0&Y&Adding ___ memory (central storage) can provide immediate system-wide performance improvement without
;making any changes to the application programs.&physical&&In virtual storage systems any time main memory (central storage) is added to the server it can provide an
;
;
;immediate system-wide performance improvement without making any changes to the application programs&&&&undefined.0&&&&&1&&&N.
os2.036&esa&0&&Programmers who use virtual memory can write code as if they had unlimited memory resources available – at
;least until they bump into the limits imposed by the _____ of an architecture.&addressability &&The virtual memory that a programmer sees is also usually the maximum addressability of an architecture.
;The main memory is limited by the machine's specific configuration, which is typically much less than the
;architectural limit.&&&&undefined.0&&&&&1&&&N.
os2.037&esa&0&&Programmers can optimize memory sharing by pushing lower-_____ users off stage for a while when more urgent
;business requires more memory. &priority&&Another technique for optimizing memory sharing is temporarily swapping users in and out of main memory
;before they finish execution. Swapping can be thought of as a wholesale paging operation done to free up
;large amounts of main storage occupied by low priority work in the system. When memory constraints improve,
;the swapped entity can be restored and resume execution.&&&&undefined.0&&&&&1&&&N.