The document provides a list of 12 practice exercises related to operating system concepts:
1. The exercises ask the reader to define operating system purposes, compare mainframe and PC operating systems, list steps to run a program on a dedicated machine, and discuss when an operating system should forsake efficiency.
2. Additional exercises ask about real-time operating system challenges, whether applications should be included in the operating system definition, how kernel/user modes provide protection, and which instructions should be privileged.
3. Further exercises describe potential issues with an early memory protection scheme, uses for multiple CPU modes, using timers to compute time, and classifying the Internet as a LAN or WAN.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
265 views
1 Exr
The document provides a list of 12 practice exercises related to operating system concepts:
1. The exercises ask the reader to define operating system purposes, compare mainframe and PC operating systems, list steps to run a program on a dedicated machine, and discuss when an operating system should forsake efficiency.
2. Additional exercises ask about real-time operating system challenges, whether applications should be included in the operating system definition, how kernel/user modes provide protection, and which instructions should be privileged.
3. Further exercises describe potential issues with an early memory protection scheme, uses for multiple CPU modes, using timers to compute time, and classifying the Internet as a LAN or WAN.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
CHAPTER
1 Introduction
Practice Exercises
1.1 What are the three main purposes of an operating system?
1.2 What are the main differences between operating systems for mainframe computers and personal computers? 1.3 List the four steps that are necessary to run a program on a completely dedicated machine. 1.4 We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for the operating system to forsake this principle and to “waste” resources? Why is such a system not really wasteful? 1.5 What is the main difficulty that a programmer must overcome in writing an operating system for a real-time environment? 1.6 Consider the various definitions of operating system. Consider whether the operating system should include applications such as Web browsers and mail programs. Argue both that it should and that it should not, and support your answer. 1.7 How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security) system? 1.8 Which of the following instructions should be privileged? a. Set value of timer. b. Read the clock. c. Clear memory. d. Issue a trap instruction. e. Turn off interrupts. f. Modify entries in device-status table. 1 2 Chapter 1 Introduction
g. Switch from user to kernel mode.
h. Access I/O device. 1.9 Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme. 1.10 Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes? 1.11 Timers could be used to compute the current time. Provide a short de- scription of how this could be accomplished. 1.12 Is the Internet a LAN or a WAN?