更多"The UNIX operating system is made u"的相关试题:
[单项选择]
The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the () of the operating system: it allocates time and memory to programs and handles the filestore and communications in response to () .
The shell acts as an () between the user and the kernel. When a user logs in, the () program checks the username and password, and then starts another program called the shell. The shell is a command line () (CLI). It interprets the commands the user types in and arranges for them to be carded out. The commands are themselves programs: when they terminate, the shell gives the user another prompt (% on our systems).
The kernel of UNIX is the () of the operating system.
A. hub
B. center
C. core
D. nucleus
[单项选择]Computer operating system software has become increasingly standardized. But when a large business with multiple, linked computer systems uses identical operating system software on all of its computers, a computer vandal who gains access to one computer automatically has access to the data on all the computers. Using a program known as a "virus," the vandal can then destroy much of the data on all the computers. If such a business introduced minor variations into its operating system software, unauthorized access to all the computers at the same time could be virtually eliminated. Furthermore, variations in operating system software can be created without any loss of computer compatibility to the business. Therefore, it is advisable for businesses to implement such variations.
Which one of the following, if true, supports the conclusion in the passage
A. Standardization of computer operating system software has increased computer compatibility among different businesses.
B. Correcting any damage resulting from an invasion by a computer virus program is more expensive than preventing the damage.
C. It is not costly for a business to maintain incompatible computer operating systems.
D. There are other kinds of destructive computer programs that do not depend on intercomputer links.
E. (E) Not all businesses need to share data among their internal computer systems.
[单项选择]As an operating system repeatedly allocates and frees storage space, many physically separated unused areas appear. This phenomenon is called ().
A. fragmentation
B. compaction
C. swapping
D. paging
[单项选择]Ditrama is a federation made up of three autonomous regions: Korva, Mitro and Guadar. Under the federal revenuesharing plan, each region receives a share of federal revenues equal to the share of the total population of Ditrama residing in that region as shown by a yearly population survey. Last year, the percentage of federal revenues Korva received for its share decreased somewhat even though the population survey on which the revenue-sharing was based showed that Korva’s population had increased.
If the statements above are true, which one of the following must also have been shown by the population survey on which last year’s revenue-sharing in Ditrama was based
A. Of the three regions, Korva had the smallest number of residents.
B. The population of Korva grew by a smaller percentage than it did in previous years.
C. The populations of Mitro and Guadar each increased by a percentage that exceeded the percentage by which the population of Korva increased.
D. Of the three regions, Korva’s numerical increase in population was the smallest.
E. (E) Korva’s population grew by a smaller percentage than did the population of at least one of the other two autonomous regions.
[单项选择]The heat generated by the operating system war between rivals IBM Corp. and Microsoft Corp. is (21) .
Windows 95 and OS/2 introduce a new (22) . Both systems claim to multitask legacy DOS and 16-bit Windows applications. However, only OS/2 can provide full memory (crash) protection for these legacy applications because it is capable of running each DOS and Windows application within its full-protected memory address space.
Windows 95 will run all current Windows applications in the same shared- memory address space, affording full memory protection only to the (23) 32-bit Windows 95 applications. In other word, Windows 95 users will have to (24) their current Windows applications to Windows 95 version to match the memory protection OS/2 now delivers.
While OS/2 does afford superior memory protection and multitasking for legacy DOS and Windows applications, it will not be able to run any Windows 95 applications. IBM may address this (25) A. place
B. environment
C. condition
D. action