0% found this document useful (0 votes)
13 views6 pages

Chapter1 Exercise QnA

The document contains exercises from the 7th edition of 'Understanding Operating Systems' aimed at encouraging original thought and analysis among students. It covers various topics related to operating systems, including Moore's Law, batch processing, real-time systems, and the differences between main memory and secondary storage. The exercises require students to provide examples, explanations, and comparisons to demonstrate their understanding of operating system concepts.

Uploaded by

Abdullah Opadeji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views6 pages

Chapter1 Exercise QnA

The document contains exercises from the 7th edition of 'Understanding Operating Systems' aimed at encouraging original thought and analysis among students. It covers various topics related to operating systems, including Moore's Law, batch processing, real-time systems, and the differences between main memory and secondary storage. The exercises require students to provide examples, explanations, and comparisons to demonstrate their understanding of operating system concepts.

Uploaded by

Abdullah Opadeji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Understanding Operating Systems, 7th edition

Chapter 1 Exercises

Note: Some parties illegally post the solution to exercises from computer science texts on
the web for students to download, copy, and paste. Therefore, some exercises in this book
have been designed to encourage students to analyze problems and explain their thoughts
in an original form. We believe this technique inspires more original thinking and allows
students to more completely demonstrate their understanding of the material. – Author)

1. Gordon Moore predicted the dramatic increase in transistors per chip in 1965 and his
prediction has held for decades. Some industry analysts insist that Moore’s Law been
a predictor of chip design, but others say it is a motivator for designers of new chips?
In your opinion, who is correct? Explain your answer. ANSWER: There is evidence
that Moore’s Law has set the expectations of the industry and chip development
teams and that they are driven to make the impressive leaps in chip technology every
18 to 24 months. The law was not expected to hold, yet it has for a very long time.
This continuing achievement has let others to say that the development curve does not
drive the innovations but is instead a mere predictor. Researchers have not yet
concluded which side is correct. Look for original reasoning here.
2. Give an example of an organization that might find batch-mode processing useful and
explain why. ANS: One example would be an archival environment that is backing up
a system every night. Another might be an environment where routine processing
every day follows the same patter. Answers should vary here. Look for evidence that
the student understands batch processing.
3. Name five current operating systems (other than those mentioned in Table 1.1) and
identify the computers, platforms, or configurations where each is used. ANS: With
each student naming five different operating systems, the accumulation of these
answers should demonstrate the numerous operating systems in existence and the
environments in which they are used. This is a good opportunity to explore multiple
platforms, multiple situations in which operating systems can be found. The answers
should not merely include five versions of a single operating system.
4. List three situations that might demand a real-time operating system and explain in

UOS, 7e Ann McIver McHoes


This study source was downloaded by 100000811044824 from CourseHero.com on 12-07-2022 14:54:31 GMT -06:00
Chapter One, Page 1

https://www.coursehero.com/file/49965405/01-Answers-to-Exercisesdocx/
Understanding Operating Systems, 7th edition

detail the system characteristics that persuade you to do so. ANS: Examples could
include space stations, fly-by-wire aircraft, hospital surgical robots, power station
controllers, automobile computers, and more. Use this as a way to explore the concept
of real-time computing and the related subject of embedded computing.
5. Many people confuse main memory and secondary storage. Explain why this might
happen and describe how you would explain the differences to classmates so they
would no longer confuse the two. ANS: One cause of the confusion is that both use
identical units of measurement -- bytes (MB, GB, etc.) Another is that they both store
programs and instructions. However, main memory (primary storage) is temporary
and secondary storage is much more permanent. Look for evidence that the student
understands the differences between them. When students describe a technique or
argument to explain the differences to classmates, look for original thinking and a
convincing explanation. Emphasize that the ability to communicate clearly is a bonus
to anyone in a technical field.
6. Name the five key concepts about an operating system that you think a user needs to
know and understand. ANS: Depending on the user, these key concepts will vary.
Look for originality here as there is no one correct answer. Operating systems is a
popular subject, perhaps because it is mysterious. As the chief piece of software,
many users know of the existence of an operating system, but few can name its
functions or why it’s important. A technician would want to know how it works, a
novice might want to know why it is important.
7. Explain the impact of the evolution of computer hardware and the accompanying
evolution of operating systems software. ANS: Look for students to explain the
IMPACT of new computer hardware and software. Historically, the operating system
software was developed hand-in-hand with the hardware – that is, as the hardware
changed, so did the software supporting it. However, over time, and as operating
systems became more multi-platform, they have evolved separately.
8. Give real world examples of interactive, batch, real-time, and embedded systems and
explain the fundamental differences among them. ANS: The students should not cut
and paste the definitions shown below but should use original language and give
thoughtful examples of each.

UOS, 7e Ann McIver McHoes


This study source was downloaded by 100000811044824 from CourseHero.com on 12-07-2022 14:54:31 GMT -06:00
Chapter One, Page 2

https://www.coursehero.com/file/49965405/01-Answers-to-Exercisesdocx/
Understanding Operating Systems, 7th edition

 Interactive systems, in simplest terms, are those that allow each user to interact
directly with the operating system accommodating interruptions, multiple
processes, and sometime multiple users.
 Batch systems are a type of computing system that executes programs, each of
which is submitted in its entirety, can be grouped into batches, and execute
without external intervention.
 Real-time systems are used in time-critical environments that require guaranteed
response times, such as navigation systems, rapid transit systems, and industrial
control systems.
 Embedded systems are dedicated computer systems that often reside inside a larger
physical system, such as jet aircraft or automobiles. Often, they must be small and
fast and work with real-time constraints, fail-safe execution, and nonstandard I/O
devices.
9. Briefly compare active and passive multiprogramming and give examples of each.
ANS: Look for students to explain in their own words active multiprogramming vs.
passive multiprogramming and give at least one good example of each.
10. Give at least two reasons why a regional bank might decide to buy six networked
servers instead of one mainframe. ANS: There are several reasons, but many would
hinge on the potential reliability of interconnected servers. Because students have not
yet learned much about this subject in this book (it is covered later in the text), they
can be expected to speculate as to the reasons so they can independently explore the
concepts behind networking.
11. Select two of the following professionals: an insurance adjuster, a delivery person for
a courier service, a newspaper reporter, a doctor (general practitioner), or a manager
in a supermarket. Suggest at least two ways that each person might use a mobile
computer to work more efficiently.
ANS: Answers here should vary from one student to the next. Look for answers that
explore the role of mobile computing to everyday life.
12. Compare the development of two operating systems described in Chapters 13-16 of
this text, including design goals and evolution. Name the operating system each was

UOS, 7e Ann McIver McHoes


This study source was downloaded by 100000811044824 from CourseHero.com on 12-07-2022 14:54:31 GMT -06:00
Chapter One, Page 3

https://www.coursehero.com/file/49965405/01-Answers-to-Exercisesdocx/
Understanding Operating Systems, 7th edition

based on, if any. Which one do you believe is more efficient for your needs? Explain
why. ANS: This question gives students the opportunity to quickly look over these
chapters and learn a little bit about the four systems described there. We hope that
readers will refer to these chapters as they go through the book to see how each of
these unique real-world operating systems apply the concepts described in the
chapters.

Advanced Exercises

Advanced Exercises are appropriate for readers with supplementary knowledge of


operating systems.

13. In computing literature, the value represented by the prefixes kilo-, mega-, giga-, etc.
can vary depending on whether they are describing many bytes of main memory or
many bits of data transmission speed. Calculate the number of bytes in a megabyte
(MB) and compare it to the number of bits in a megabit (Mb). If there is a difference
or uncertainty, explain why that is the case. Cite your sources. ANS: This is a quirky
situation that has resulted from the fact that a megabyte and a megabit are based on
different numbering systems. One Megabyte (MB) is based on a power of two and
equals (220), whereas a Megabit (often seen as megabit per second (Mbps)) is based
on a power of ten (106). Therefore 1 MB = 1,048,576 bytes, and 1 Mbps = 1,000,000
bits per second. The issue is the same for gigabytes and gigabits, etc. Therefore,
although the abbreviations for each are similar, they obviously represent very
different values.
14. Draw a system flowchart illustrating the steps performed by an operating system as it
executes the instruction to back up a disk on a single-user computer system. Begin
with the user typing the command on the keyboard or choosing an option from a
menu, and conclude with the result being displayed on the monitor.
The pseudo code for the flowchart is below:
1. User issues command to BACKUP via the User Interface
2. User Interface interprets command
- awakens File Manager

UOS, 7e Ann McIver McHoes


This study source was downloaded by 100000811044824 from CourseHero.com on 12-07-2022 14:54:31 GMT -06:00
Chapter One, Page 4

https://www.coursehero.com/file/49965405/01-Answers-to-Exercisesdocx/
Understanding Operating Systems, 7th edition

3. File Manager resolves address of file to be backed up


- awakens Device Manager
4. Device Manager opens access path to drive from where files are to be backed up
- reads file (or portion of it) into I/O buffer
- awakens Memory Manager
5. Memory Manager allocates memory for file in I/O buffer
- awakens Processor Manager
6. Processor Manager loads file from I/O buffer to memory
- awakens File Manager
7. File Manager resolves address of file to be copied to new disk
- awakens Processor Manager
8. Processor Manager copies file from memory to I/O buffer
- awakens Device Manager
9. Device Manager opens access path to drive where file will be copied
- reads file from I/O buffer to new disk
- awakens File Manager
10. File Manager determines if file is completely copied
- if yes, writes Trailer Label
- jump forward to step 11
- if no, resolves address of next section of file to be backed up
- awakens Device Manager returns to step 4
11. File Manager determines if this is the last file to be backed up
- if no, awakens Processor Manager
- Processor Manager activates user interface
- sends File N has been backed up message to user
- jump back to step 3
- if yes, awakens Processor Manager
- Processor Manager activates user interface
- sends “All files have been backed up” message to user
- Continue with other functions

15. In a multiprogramming and time-sharing environment, several users share a single

UOS, 7e Ann McIver McHoes


This study source was downloaded by 100000811044824 from CourseHero.com on 12-07-2022 14:54:31 GMT -06:00
Chapter One, Page 5

https://www.coursehero.com/file/49965405/01-Answers-to-Exercisesdocx/
Understanding Operating Systems, 7th edition

system at the same time. This situation can result in various security problems. Name
two such problems. Can we ensure the same degree of security in a time-share
machine as we have in a dedicated machine? Explain your answers. ANS: The only
secure computing environment is one that is not networked and is dedicated to only a
single task or a single user. Among the security issues that arise in a shared processing
environment are:
 inadvertent or intentional access to user ids and passwords
 unauthorized access to private data
 unauthorized access to, or alteration of, the operating system software
 inadvertent or intentional spreading of viruses and other malware
16. The boot sequence is the series of instructions that enable the operating system to get
installed and running. In your own words, describe the role of firmware and the boot
process for an operating system of your choice. ANS: In general, firmware begins the
loading of the operating system and each boot process is loaded in a special sequence.
Students should describe, for the operating system chosen, the role of the firmware
and its interaction with the booting sequence for the operating system chosen.
17. A “dual boot” system gives users the opportunity to choose from among a list of
operating systems when powering on a computer. Describe how this process works.
Explain whether or not there is a risk that one operating system could intrude on the
space reserved for another operating system. ANS: Dual booting, by definition,
allows exactly two operating systems to be loaded onto the same computer at the
same time. Multi-booting would allow more than two. If the dual booting software is
working correctly, there is no risk that either operating system will intrude, even
inadvertently on the other operating system. A common configuration would be
having Windows and Linux loaded on the same computer so that the user can choose
on the opening screen which operating system to load. Thereafter, one can switch
operating systems after rebooting the computer.

UOS, 7e Ann McIver McHoes


This study source was downloaded by 100000811044824 from CourseHero.com on 12-07-2022 14:54:31 GMT -06:00
Chapter One, Page 6

https://www.coursehero.com/file/49965405/01-Answers-to-Exercisesdocx/
Powered by TCPDF (www.tcpdf.org)

You might also like