CHAPTER
Introduction
Practice Exercises
1.1
What are the three main purposes of an operating system?
Answer: The three main puropses are:
• To provide an environment for a computer user to execute programs on computer hardware in a convenient and efficient manner.
• To allocate the separate resources of the computer as needed to solve the problem given. The allocation process should be as fair and efficient as possible.
• As a control program it serves two major functions: (1) supervision of the execution of user programs to prevent errors and improper use of the computer, and (2) management of the operation and control of I/O devices.
1.2
What are the main differences between operating systems for mainframe computers and personal computers?
Answer: Generally, operating systems for batch systems have simpler requirements than for personal computers. Batch systems do not have to be concerned with interacting with a user as much as a personal computer. As a result, an operating system for a PC must be concerned with response time for an interactive user. Batch systems do not have such requirements. A pure batch system also may have not to handle time sharing, whereas an operating system must switch rapidly between different jobs.
1.3
List the four steps that are necessary to run a program on a completely dedicated machine —a computer that is running only that program.
Answer: The four steps are:
a.
Reserve machine time.
b.
Manually load program into memory.
c.
Load starting address and begin execution.
1
2
Chapter 1 Introduction
d.
Monitor and control execution of program from console.
1.4
We have stressed the need for an operating system to make efficient use of the computing hardware. When is it appropriate for the operating system to forsake this principle and to “waste” resources? Why is such a system not really wasteful?
Answer: Single-user systems should maximize use of the system for the user. A GUI might “waste” CPU cycles, but it optimizes the user’s interaction with the system.
1.5
What is the main difficulty that a programmer must overcome in writing an operating system for a real-time environment?
Answer: The main difficulty is keeping the operating system within the fixed time constraints of a real-time system. If the system does not complete a task in a certain time frame, it may cause a breakdown of the entire system it is running. Therefore when writing an operating system for a real-time system, the writer must be sure that his scheduling schemes don’t allow response time to exceed the time constraint.
1.6
Consider the various definitions of operating system. Next, consider whether the operating system should include applications such as Web browsers and mail programs. Argue both that it should and that it should not, and support your answers.
Answer: Point. Applications such as web browsers and email tools are performing an increasingly important role in modern desktop computer systems. To fulfill this role, they should be incorporated as part of the operating system. By doing so, they can provide better performance and better integration with the rest of the system. In addition, these important applications can have the same look-and-feel as the operating system software.
Counterpoint. The fundamental role of the operating system is to manage system resources such as the CPU, memory, I/O devices, etc. In addition, it’s role is to run software applications such as web browsers and email applications. By incorporating such applications into the operating system, we burden the operating system with additional functionality.
Such a burden may result in the operating system performing a less-thansatisfactory job at managing system resources. In addition, we increase the size of the operating system thereby increasing the likelihood of system crashes and security violations.
1.7
How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security) system?
Answer: The distinction between kernel mode and user mode provides a rudimentary form of protection in the following manner. Certain instructions could be executed only when the CPU is in kernel mode.
Similarly, hardware devices could be accessed only when the program is executing in kernel mode. Control over when interrupts could be enabled or disabled is also possible only when the CPU is in kernel mode.
Consequently, the CPU has very limited capability when executing in user mode, thereby enforcing protection of critical resources.
1.8
Which of the following instructions should be privileged?
Practice Exercises
a.
Set value of timer.
b.
Read the clock.
c.
Clear memory.
d.
Issue a trap instruction.
e.
Turn off interrupts.
f.
Modify entries in device-status table.
g.
Switch from user to kernel mode.
h.
3
Access I/O device.
Answer: The following operations need to be privileged: Set value of timer, clear memory, turn off interrupts, modify entries in device-status table, access I/O device. The rest can be performed in user mode.
1.9
Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme.
Answer: The data required by the operating system (passwords, access controls, accounting information, and so on) would have to be stored in or passed through unprotected memory and thus be accessible to unauthorized users.
1.10
Some CPUs provide for more than two modes of operation. What are two possible uses of these multiple modes?
Answer: Although most systems only distinguish between user and kernel modes, some CPUs have supported multiple modes. Multiple modes could be used to provide a finer-grained security policy. For example, rather than distinguishing between just user and kernel mode, you could distinguish between different types of user mode. Perhaps users belonging to the same group could execute each other’s code. The machine would go into a specified mode when one of these users was running code. When the machine was in this mode, a member of the group could run code belonging to anyone else in the group.
Another possibility would be to provide different distinctions within kernel code. For example, a specific mode could allow USB device drivers to run. This would mean that USB devices could be serviced without having to switch to kernel mode, thereby essentially allowing USB device drivers to run in a quasi-user/kernel mode.
1.11
Timers could be used to compute the current time. Provide a short description of how this could be accomplished.
Answer: A program could use the following approach to compute the current time using timer interrupts. The program could set a timer for some time in the future and go to sleep. When it is awakened by the interrupt, it could update its local state, which it is using to keep track of the number of interrupts it has received thus far. It could then repeat this process of continually setting timer interrupts and updating its local state when the interrupts are actually raised.
4
Chapter 1 Introduction
1.12
Is the Internet a LAN or a WAN?
Answer: The Internet is a WAN as the various computers are located at geographically different places and are connected by long-distance network links.
You May Also Find These Documents Helpful
-
to the kernel and how important aspects can be modified on the fly at anytime during the bootup process because it…
- 534 Words
- 3 Pages
Satisfactory Essays -
2. Vulnerabilities in Kernel-Mode Driver Could Allow Elevation Of Privilege (2829996). They are important but not considered high-priority.…
- 272 Words
- 1 Page
Satisfactory Essays -
With multiple processors executing the same or different parts of the kernel, kernel tables and management structures must be managed properly to avoid data corruption or invalid operations.…
- 1341 Words
- 6 Pages
Good Essays -
Kernel mode: Kernel mode (also referred to as privileged mode) operates on Ring 0 of the Intel 386 microprocessor protection model and has access to all hardware, memory, and has access to the other user’s address space. This mode includes access to the Windows NT family Executive Services, the hardware abstraction layer (HAL), and the Microkernel. (Regan, 2006)…
- 260 Words
- 2 Pages
Satisfactory Essays -
Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…
- 573 Words
- 3 Pages
Good Essays -
This course is an introduction to the fundamentals of personal computer operating systems for computer software configuration, file management, performance monitoring, optimization, maintenance, recovery, and security.…
- 2660 Words
- 11 Pages
Satisfactory Essays -
Hardware can affect a computers OS and software in several ways. If your keyboard has something stuck under the key it may not allow you to type in the program you are trying to type in. If you restrict airflow to the computer it can cause it to overheat and not work properly or stop working all together. A computers OS and software can also cause problems to the hardware. If you obtain a virus through the internet it can cause permanent damage to your…
- 816 Words
- 3 Pages
Good Essays -
From late 2003 to early 2004, during the Iraq War, military police personnel of the United States Army and the Central Intelligence Agency[1] committed human rights violations against prisoners held in the Abu Ghraib prison. They physically and sexually abused, tortured,[2][3][4] raped,[2][3] sodomized,[4] and killed[5] prisoners.…
- 370 Words
- 2 Pages
Satisfactory Essays -
The Pareto phenomenon is one of the most important and pervasive concepts that can be applied at all levels of management.…
- 406 Words
- 2 Pages
Satisfactory Essays -
You have three hours to take and submit this exam. You must save this file using the following convention: LastnameFirstname (for example, my exam would be saved as SmithReed.docx). If you do not have the most current version of Word, that is OK. The file extension might be .doc instead. The document is protected (Tools menu) so that the data in the answer cells is type-restricted. You may unprotect the document in order to “paste” excerpts from Excel (they must be formatted to fit) into your computations, but then you should re-protect the document without passwords so that you do not lose the answer formatting for the remainder of the exam. The exam does NOT have to be protected when it is submitted (after you are done).…
- 1970 Words
- 8 Pages
Good Essays -
01. (2005.3) Is the opinion of the majority—in government or in any other circumstances—a poor guide?…
- 1794 Words
- 8 Pages
Satisfactory Essays -
|Brief summary of the chapter |Negative effects of clear-cutting: |Situations where |2 Primary causes of |…
- 407 Words
- 2 Pages
Satisfactory Essays -
During the time period of 200 BCE to 1450 CE, the Silk Road was very,very important. The Silk Road was able to connect empires from the eastern part to the western part. While major items have been exchange in the the Silk Road spreaded religion, technology,ideas,styles of customs, and spreads of disease was always an occasion at the time.…
- 368 Words
- 2 Pages
Good Essays -
Early computers were built to perform a series of single tasks, like a calculator. Basic operating system features were developed in the 1950s, such as resident monitor functions that could automatically run different programs in succession to speed up processing. Operating systems did not exist in their modern and more complex forms until the early 1960s.[5] Hardware features were added, that enabled use of runtime libraries, interrupts, and parallel processing. When personal computers became popular in the 1980s, operating systems were made for them similar in concept to those used on larger computers.…
- 1177 Words
- 5 Pages
Powerful Essays -
WebGoat installations are intended to be download, unzip, and click-to-run installations. However, some users prefer just downloading the war file. Instructions for all installations are included.…
- 406 Words
- 2 Pages
Powerful Essays