b) It offers the ability to the OSto cater for processes larger than the Main memory can
accommodate.
c) Simplifies the operation memory management.
d) Efficiency in power consumption.
8. What is a process in OS?
a) A collection of running programs.
b) An instance of a program that is running.
c) A technique used to manage memory management.
d) scheduling of tasks.
9. What does the term scheduling refers to in process management?
a) Processallocation to memory pages.
b) Technique applied by the OS in determining the the order in which processes are
executed.
c) Configuration of processes.
d) Processallocation to CPU.
10. The read state of a process indicates that ....
a) The process is currently under execution.
b) The process is waiting for an event to occur prior execution.
c) The process is waiting for CPUtime.
d) The process has completed its execution.
Fill in the missing words:
11. A specialized software that enables the OS and hardware peripheral component to
communicates is a ----------
12. A/an _______
is a signal from hardware or software indicating that there is an
event that in the computer that requires immediate attention.
13. __________
is a nonprimitive scheduling algorithm that handles incoming in
the order they arrive in the ready.
14. A(n) ________
contains files with the names of users who are allowed to
access it and the type of access each user is permitted.
15. ________
are resources that can be taken away from active process and
reallocated to another process in the ready queue.
Determine whether the following statements are true or false:
16. File management includes creating, editing, moving, and deleting files on a computer
system:
17. Operating system security is mainly concerned with protecting the system from
unauthorised access and threats.
18. Least Recently Used algorithm (LRU)works on the assumption that the most recently used
page is likely not to be requested back in the RAM.
19. Regular software updates are critical in the maintained of the OS security and protecting
against system vulnerabilities.