Files
survey-manager/survey-nginx/secure_html/data/tests/os2.testcentral
2024-07-19 10:05:36 +00:00

39 lines
11 KiB
Plaintext
Executable File
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
os2.001&mcs&0&Y&Which one of the following best describes the purpose of an operating system?&Managing hardware and providing services to applications&Sorting large files;Managing on-line application development;Managing the tape library;&&&&a&undefined.0&&&&&1:v&&&N.
os2.002&mcs&0&Y&Which of the following IBM eServers use IRQs, I/O addresses, and DMAs as a way for the operating system to connect with the processor?&xSeries and Netfinity servers&iSeries and AS/400 servers;zSeries and S/390 servers;pSeries and RS/6000 platforms;&&&&a&undefined.0&&&&&1:v&&&N.
os2.003&mcs&0&N&Which of the following is a false statement?&System overhead for running a program in virtual memory is lower compared to running a program in real memory.&Very positive and practical results have been achieved with virtual memory environments because the 80/20 rule has proven to be reliable.;Virtual memory implementations help programmers.;&This statement is false. System overhead is higher managing virtual storage because of address translation and
;paging. &&&a&undefined.0&&&&&1:v&&&N.
os2.004&tf&0&Y&True or False? IBM eServer platforms are capable of handling concurrent transactions and providing sub-second response time, while running batch jobs to fill in any idle time.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.005&mcs&0&Y&Which one of the following did the material in this lesson suggest was a very popular and cost-effective security measure?&Passwords changed at regular intervals&Retina scanners;Card swipes;Security guards;&&&&a&undefined.0&&&&&1:v&&&N.
os2.006&mcs&0&Y&Your CIO says, "We have a lot of technology personnel who leave to pursue other opportunities. How can I be sure someone doesn't take some of our business files with them on their way out?" Click the best security rule to apply in this situation.&Restrict file access&Create an audit trail;Issue new user IDs once a month;Institute a multiple password system;&&&&a&undefined.0&&&&&1:v&&&N.
os2.007&mcs&0&Y&What kind of services does the operating system provide to coordinate shared resources and maintain the integrity of updated resources? &Serialization services&Timer services ;Locking services;Management services;&&&&a&undefined.0&&&&&1:v&&&N.
os2.008&tf&0&Y&True or False? The AIX kernel provides the ability to share resources simultaneously among many processes or threads and users.&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.009&tf&0&Y&True or False? A computer's operating system workload can not be prioritized using preemptive multitasking. &TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.010&tf&0&N&True or False? <br><br>Virtual memory is used to optimize central storage.&TRUE&FALSE&This is true. Remember, the terms central memory, real memory, and main memory are used interchangeably.&&&&undefined.0&&&&&1&&&N.
os2.011&mcs&0&N&Virtual memory operating systems can keep what portion of a typical program in main memory and still meet
;service level objectives for the program?&20%&30%;50%;10%;&20% is a rule of thumb that could rise or fall depending on the program.&&&a&undefined.0&&&&&1:v&&&N.
os2.012&tf&0&Y&True or False? <br><br>One advantage of virtual memory is that it degrades the overall performance of the
;operating system. &FALSE&TRUE&The degrading of the overall performance of the operating system is a disadvantage.&&&&undefined.0&&&&&1&&&N.
os2.013&tf&0&Y&True or False? Additional memory can not help reduce or eliminate the effects of disk drag and its impact on
;overall system performance.&FALSE&TRUE&Additional memory can help reduce or eliminate the effects of disk drag and its impact on overall system
;performance&&&&undefined.0&&&&&1&&&N.
os2.014&tf&0&Y&True or False? One benefit of virtual memory is that when a large portion of the system is present in virtual memory, ongoing upgrades of main memory or expanded storage capacity improve the overall performance?&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.015&tf&0&Y&True or False? A subsystem makes the larger processing system operate slower and less efficiently.&FALSE&TRUE&The opposite is true, the subsystem makes the larger system operate more efficiently.&&&&undefined.0&&&&&1&&&N.
os2.016&mcs&0&Y&What is the opposite of batch processing?&Transaction processing&Automatic processing;Management processing;&&&&a&undefined.0&&&&&1:v&&&N.
os2.017&tf&0&Y&True or False? Hackers pose almost no threat to zSeries and s/390&TRUE&FALSE&&&&&undefined.0&&&&&1&&&N.
os2.018&mcs&0&Y&What is the most secure server?&zSeries&iSeries;UNIX;Windows;&&&&a&undefined.0&&&&&1:v&&&N.
os2.019&mcs&0&Y&What is the most widely used security technique?&Passwords&Retina scanners;Tracking;&&&&a&undefined.0&&&&&1:v&&&N.
os2.020&esa&0&&Main storage is also called ____ storage or real storage.&central&&Main storage is also called central storage or real storage.&&&&undefined.0&&&&&1&&&N.
os2.021&tf&0&N&The size of memory in main storage restricts how much work a computer can handle at once.&TRUE&FALSE&When computers were used in the 1960s, the limited supply of main storage (measured in kilobytes or
;<br>megabytes) restricted how much work a computer could handle at the same time. Large programs that <br>
;consumed all available system memory prevented other programs from loading.&&&&undefined.0&&&&&1&&&N.
os2.022&esa&0&&Virtual memory acts like a larger version of ___ memory.&real&&Virtual memory acts like a larger version of real memory.&&&&undefined.0&&&&&1&&&N.
os2.023&esa&0&&____ memory is a logical view of storage.&Virtual&&Virtual memory is a logical view of storage.&&&&undefined.0&&&&&1&&&N.
os2.024&esa&0&&Virtual items can include the hardware, the I/O, ____, server, host, domain, and access methods.&storage&&Virtual items can include the hardware, the I/O, storage, server, host, domain, and access methods.&&&&undefined.0&&&&&1&&&N.
os2.025&esa&0&&Virtualization lets the system use ___ memory more efficiently.&main&&Virtualization lets the system use main memory more efficiently.&&&&undefined.0&&&&&1&&&N.
os2.026&tf&0&N&Virtualization lets programmers ignore the amount of main memory available.&TRUE&FALSE&Programmers can write programs without being concerned about how much central or main memory might be <br>
;available.&&&&undefined.0&&&&&1&&&N.
os2.027&tf&0&&Virtualization comes at the price of demanding extra overhead. &TRUE&FALSE&Virtual memory degrades the overall performance of the operating system. The operating system needs extra
;overhead to manage storage mapping, address translation, and program section movement to and from main
;memory while the program is executing. Therefore, the system must be configured with enough memory and
;processor power to provide an acceptable level of performance.&&&&undefined.0&&&&&1&&&N.
os2.028&esa&0&N&The IBM i (formely iSeries and AS400) uses single-level virtual storage techniques and make no distinction
;between _____ storage and the main storage.&disk&&The IBM i uses virtual storage techniques through single-level storage. No distinction is made between disk
;storage and the main storage. Swapping occurs to move large amounts of data between main memory and the disk,
;even though a single-level storage view exists and performance penalties still apply. &&&&undefined.0&&&&&1&&&N.
os2.029&esa&0&&The z/OS can make ___ or explicit requests for virtual storage.&implicit&&Programmers on z/OS use the virtual storage area assigned to their job step by making implicit and explicit
;requests for virtual storage. Furthermore, z/OS will request virtual storage as needed to contain the
;control blocks required to manage active programs (tasks).&&&&undefined.0&&&&&1&&&N.
os2.030&tf&0&N&Programs executed in virtual memory pretend that they have unlimited central memory to work with.&TRUE&FALSE&Program developers work with the premise that sufficient main memory is available such that business
;<br>;applications don't have to manage shared memory space&&&&undefined.0&&&&&1&&&N.
os2.031&tf&0&N&Programs executed in virtual memory impair security by isolating the programs that are active at the same time,
;thus sharing main memory with one another.&FALSE&TRUE&Programs executed in virtual memory enhance security by isolating the programs that share main memory from
;<br>;one another.&&&&undefined.0&&&&&1&&&N.
os2.032&esa&0&&Since the cost of hardware continues to drop, while programmer salaries rise, making the computer do more
;of the work (increasing the ___) is a wise move.&overhead&&Virtual storage capability offers convenience to the program developer; however, this convenience comes
;with the penalty of system overhead. With the cost of personnel rising and the price of computer hardware
;falling, most developers agree that making this performance tradeoff is well worth the penalty.&&&&undefined.0&&&&&1&&&N.
os2.033&tf&0&&Excessive paging is one factor that can degrade a programs performance.&TRUE&FALSE&How well or poorly a program actually performs in a virtual memory environment depends on its level of
;paging activity and on other complex factors.&&&&undefined.0&&&&&1&&&N.
os2.034&esa&0&&Virtual memory operating systems, such as z/OS, AIX, or IBM i, typically keep only the liveliest ___
;percent of a typical program in main memory&20&&Very positive and practical results have been achieved in virtual memory environments because the 80/20
;rule has proven to be workable.Virtual memory operating systems, such as z/OS, AIX, or IBM i, will
;typically keep only 20 percent of a typical program in main memory and still meet service level objectives
;(i.e. performance requirements) for the program.&&&&undefined.0&&&&&1&&&N.
os2.035&esa&0&Y&Adding ___ memory (central storage) can provide immediate system-wide performance improvement without
;making any changes to the application programs.&physical&&In virtual storage systems any time main memory (central storage) is added to the server it can provide an
;<br>;<br>;immediate system-wide performance improvement without making any changes to the application programs&&&&undefined.0&&&&&1&&&N.
os2.036&esa&0&&Programmers who use virtual memory can write code as if they had unlimited memory resources available at
;least until they bump into the limits imposed by the _____ of an architecture.&addressability &&The virtual memory that a programmer sees is also usually the maximum addressability of an architecture.
;The main memory is limited by the machine's specific configuration, which is typically much less than the
;architectural limit.&&&&undefined.0&&&&&1&&&N.
os2.037&esa&0&&Programmers can optimize memory sharing by pushing lower-_____ users off stage for a while when more urgent
;business requires more memory. &priority&&Another technique for optimizing memory sharing is temporarily swapping users in and out of main memory
;before they finish execution. Swapping can be thought of as a wholesale paging operation done to free up
;large amounts of main storage occupied by low priority work in the system. When memory constraints improve,
;the swapped entity can be restored and resume execution.&&&&undefined.0&&&&&1&&&N.