Which of the following is a technique for controlling access to a critical region?
A. spooling
B. time-sharing
C. booting
D. semaphore
查看答案
Which of the following is not involved in a context switch?
A. interrupt
B. process table
C. dispatcher
D. user interface
Which of the following is not a role of a typical operating system?
A. Control the allocation of the machine’s resources
B. Control access to the machine
C. Maintain records regarding files stored in mass storage
D. Assist the computer user in the task of processing digital photographs
Which of the following is a task that is not performed by the kernel of an operating system?
A. schedule process
B. allocate resources
C. communicate with users
D. avoid deadlock
Which of the following would be a concern of the file manager in a multi-user computer system that would not be a concern in a single-user system?
A. Maintain records regarding the location of files
B. Maintain records regarding the ownership of files
C. Maintain records regarding the size of files
D. none of the above