ID
int64 383
2.08k
| Split
stringclasses 1
value | Domain
stringclasses 4
values | SubDomain
stringclasses 24
values | Format
stringclasses 1
value | Tag
stringclasses 2
values | Language
stringclasses 1
value | Question
stringlengths 28
336
| Answer
stringclasses 2
values | Explanation
stringlengths 29
771
⌀ |
---|---|---|---|---|---|---|---|---|---|
1,539 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
One of the main differences between TCP and UDP is that TCP is a byte-stream-oriented protocol.
|
True
| null |
1,540 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
In DNS, the record responsible for resolving domain names into IP addresses is the PTR record.
|
False
| null |
1,541 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The SMTP protocol is used for remote login.
|
False
| null |
1,542 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
In the HTTP protocol, the DELETE request method is used to submit data to the server.
|
False
| null |
1,543 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The function of the DHCP protocol is to perform routing selection.
|
False
| null |
1,544 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The DHCP protocol belongs to the Network Layer.
|
False
| null |
1,545 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The transport layer protocol used by the DNS protocol is UDP.
|
True
| null |
1,546 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The transport layer protocol used by the DHCP protocol is UDP.
|
True
| null |
1,547 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The DHCP protocol is primarily used to assign IP addresses to users within a local area network (LAN).
|
True
| null |
1,548 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The user submits a service request, and the network transmits the user's request to the server. The server processes the user's request, performs the required operations, and sends the results back to the user. This working pattern is known as the C/S (Client/Server) model.
|
True
| null |
1,549 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
One of the main features of the File Transfer Protocol (FTP) is that it allows clients to specify the type and format of a file.
|
True
| null |
1,550 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
The protocol in which control information is transmitted out-of-band is FTP.
|
True
| null |
1,551 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
An FTP user sent a LIST command to retrieve the file list from the server, at which point the server should transmit the list through port 21.
|
False
| null |
1,552 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
When a computer downloads a file from an FTP server, the five encapsulation transformations performed on the data on that FTP server are data, segments, datagrams, frames, and bits.
|
True
| null |
1,553 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
SMTP is based on the UDP protocol of the transport layer, POP3 is based on the UDP protocol of the transport layer.
|
False
| null |
1,554 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
Some ports of TCP and UDP are reserved for specific applications. The port number reserved for HTTP is TCP port 80.
|
True
| null |
1,555 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Knowledge
|
English
|
An HTTP request message using the PUT method only requires the web server to respond to the HTTP message, without the need to return the requested object.
|
False
| null |
1,556 |
Test
|
Computer Network
|
Application Layer
|
Assertion
|
Reasoning
|
English
|
In the FTP working model, the well-known port number used by the server for the control connection TCP connection is 21.
|
True
|
In the FTP (File Transfer Protocol) working model, the well-known port number used for the TCP connection for control communication on the server side is indeed 21. FTP has two main connections: the control connection and the data connection. The control connection is used to transmit FTP commands and responses, while the data connection is used to transfer actual data. The control connection always uses port 21, which is the standard port number for the FTP protocol.
|
1,956 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
An operating system is software that manages hardware.
|
False
| null |
1,957 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The resources that an operating system should manage include memory, processors, and external devices, etc., whereas the source program is not a resource that should be managed by the operating system.
|
True
| null |
1,958 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The issue of concern for operating systems is the design and provision of an interface between user programs and the hardware system.
|
False
| null |
1,959 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The basic function of an operating system is to provide a user interface to facilitate user interaction.
|
False
| null |
1,960 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The two most fundamental characteristics of modern operating systems are concurrency and sharing.
|
True
| null |
1,961 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The interface provided by the operating system to programmers is the library function.
|
False
| null |
1,962 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The basic characteristics of multiprogramming include concurrency, sharing, indeterminacy, and restrictiveness, but restrictiveness is not one of these characteristics.
|
False
| null |
1,963 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The main disadvantage of batch processing systems is the lack of interactivity.
|
True
| null |
1,964 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The basic characteristics of multiprogramming include concurrency, independence, mutual exclusion, and shareability, among which shareability is not a basic characteristic of multiprogramming.
|
False
| null |
1,965 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The goal of a time-sharing system is to respond to users relatively quickly.
|
True
| null |
1,966 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
After the computer distinguishes between kernel mode and user mode instructions, the transition from kernel mode to user mode is completed after the execution of the operating system program, while the transition from user mode to kernel mode is accomplished by the hardware.
|
True
| null |
1,967 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
When the CPU is in kernel mode, the only instruction it can execute is the "supervisor call" instruction.
|
False
| null |
1,968 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The task of the BIOS is to check if the partition table is correct, determine which partition is the active partition, and at the end of the process, load the boot sector (operating system boot sector) of that partition into memory for execution.
|
False
| null |
1,969 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
Secondary storage is a resource that should not be managed by the operating system.
|
False
| null |
1,970 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
Users can interact with the computer through two methods: command-line interface and functions.
|
False
| null |
1,971 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The operating system provides users with a command interface, which can be further divided into a batch user interface and a graphical interface, to facilitate users to directly or indirectly control their jobs.
|
False
| null |
1,972 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
The fundamental characteristics of multiprogramming include concurrency, sharing, and mutual exclusion, but do not include sequentiality.
|
True
| null |
1,973 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
Interrupt handling is a function that must be provided by the operating system.
|
True
| null |
1,974 |
Test
|
Operating System
|
Overview
|
Assertion
|
Knowledge
|
English
|
In the operating system, the instruction that can only be executed in kernel mode is the fetch instruction.
|
False
| null |
1,975 |
Test
|
Operating System
|
Overview
|
Assertion
|
Reasoning
|
English
|
An important performance aspect of a time-sharing system is the system's response time. Improving the operating system's priority scheme and non-preemptive scheduling algorithms can be beneficial in enhancing the system's response time.
|
True
|
Using a priority-based + non-preemptive scheduling algorithm allows important jobs/processes to quickly receive system responses through high priority, while ensuring that less critical jobs/processes will not be indefinitely delayed in receiving system responses under non-preemptive scheduling. Such a balanced design is conducive to improving system response time. Increasing the time slice will delay the system response time: static paging management and reentrant code are unrelated to system response time.
|
1,976 |
Test
|
Operating System
|
Overview
|
Assertion
|
Reasoning
|
English
|
In a time-sharing system, the most critical issue to ensure that multiple processes can interact with the system in a timely manner is to allow all ready processes to run within a short period of time. When the number of ready processes is 100, to ensure that the response time does not exceed 2s, the maximum time slice should be 20ms.
|
True
|
The response time must not exceed 2s, meaning that all processes must be responded to within 2s. Therefore, the maximum time slice is 2s/100=20ms.
|
1,977 |
Test
|
Operating System
|
Overview
|
Assertion
|
Reasoning
|
English
|
After an interrupt occurs, the program that enters the interrupt handling belongs to the operating system software.
|
True
|
When an interrupt or exception occurs, hardware implementation ensures that the CPU running in user mode is immediately switched to kernel mode. If the interrupt occurs while a user program is running, the system transitions from user mode to supervisor mode to handle the interrupt; if a low-level interrupt is interrupted, it remains in supervisor mode, as user programs can only run in user mode. Therefore, the program that enters the interrupt handling must be an OS program. The interrupt program itself may be a user program, but the interrupt handling program must be an OS program.
|
1,978 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
The fundamental difference between a process and a program is their static and dynamic characteristics.
|
True
| null |
1,979 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
At any given moment, a change in the state of one process does not necessarily cause a change in the state of another process.
|
True
| null |
1,980 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
A process's basic state, which can transition from the other two basic states, must be the blocked state.
|
False
| null |
1,981 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
The PCB is the unique identifier of a process; global variables are not part of the PCB.
|
True
| null |
1,982 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
In GUI-based debugging programs, multi-threading is not a strength, as it uses different threads to handle user input, computation, and tracking operations separately.
|
False
| null |
1,983 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
Two cooperating processes are unable to exchange data using a message-passing system.
|
False
| null |
1,984 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
A process will inevitably cause a context switch when it transitions from the running state to the ready state.
|
True
| null |
1,985 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
When a process is waiting for a signal from a cooperating process, it is in a non-blocking state.
|
False
| null |
1,986 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
In a single-processor multiprocess system, when a process occupies the processor and the duration of its occupancy is determined by the corresponding code length of the process.
|
False
| null |
1,987 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
The round-robin scheduling algorithm is favorable for CPU-intensive jobs, but not for I/O-intensive jobs.
|
False
| null |
1,988 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
The First-Come, First-Served scheduling algorithm is absolutely preemptive.
|
False
| null |
1,989 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
The P operation may lead to the creation of a new process.
|
False
| null |
1,990 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
Among the four necessary conditions for deadlock, the one that cannot be broken is the mutual exclusion of resources.
|
True
| null |
1,991 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
An unsafe state is a deadlock state.
|
False
| null |
1,992 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
During deadlock detection, what is checked is the resource allocation graph.
|
True
| null |
1,993 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
The Deadlock Theorem is a method used for the detection of deadlocks.
|
True
| null |
1,994 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
A process image is a combination of the PCB structure with the program and data.
|
True
| null |
1,995 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
At any given moment, a change in the state of one process must cause a change in the state of another process.
|
False
| null |
1,996 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
In a single-processor system, if there are 10 processes present at the same time, then at most 10 processes can be in the ready queue.
|
False
| null |
1,997 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
After the completion of an I/O operation requested by a system process, the process state will change from blocked to ready.
|
True
| null |
1,998 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
System threads in the dynamic DLL library, when called by different processes, are the same threads.
|
True
| null |
1,999 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
In a computer system, the maximum number of processes is primarily limited by the number of users.
|
False
| null |
2,000 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
Time-sharing operating systems often adopt the Shortest Job First scheduling algorithm to serve users.
|
False
| null |
2,001 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
In operating systems, the reason for synchronizing concurrent processes is because processes must be completed within a limited time frame.
|
False
| null |
2,002 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
The program defines a shared data structure and all operations of various processes on that data structure.
|
False
| null |
2,003 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
When a waiting process is awakened by the V operation, the awakened process becomes ready.
|
True
| null |
2,004 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
There are 5 concurrent processes in a system that involve the same variable A, and the critical section related to variable A consists of 5 critical sections.
|
True
| null |
2,005 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
Mailbox communication is a direct method of communication.
|
False
| null |
2,006 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
In a system with three concurrent processes that all require four identical resources, the minimum number of resources to ensure that the system will not experience deadlock is 10.
|
True
| null |
2,007 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Knowledge
|
English
|
One of the prerequisites for introducing multiprogramming technology is that the system has time-sharing capabilities.
|
False
| null |
2,008 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
Introducing threads can enhance the degree of concurrent execution of a program, thereby further improving system efficiency.
|
True
|
A thread is a relatively independent unit of execution within a process, but it cannot run independently of the process and can only operate within it. The introduction of threads is to reduce the time and space overhead during program execution. A process can contain one or more threads.
|
2,009 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
When the time slice expires, the process transitions from the running state to the ready state.
|
True
|
When a process's time slice expires, the process transitions from the running state to the ready state, waiting for the arrival of the next time slice.
|
2,010 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
To minimize the average turnaround time, jobs with shorter runtimes should be executed first. Therefore, the execution order for the minimum average turnaround time is to execute Job 1 (2h), Job 3 (3h), Job 2 (5h), that is, in the order of Job 1, Job 3, Job 2.
|
True
|
When running in a uniprogramming mode on the same processor, to achieve the shortest average turnaround time, the Shortest Job First scheduling algorithm tends to be effective. Regarding this question: The average turnaround time for option A is (2+7+10)/3h = 19/3h; the average turnaround time for option B is (3+8+10)/3h = 7h. The average turnaround time for option C is (5+7+10)/3h = 22/3h; the average turnaround time for option D is (2+5+10)/3h = 17/3h.
|
2,011 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
The round-robin scheduling algorithm is absolutely preemptive.
|
True
|
The Round-Robin scheduling algorithm operates on a fixed time quantum; once the time is up, regardless of whether the task is completed, the current process must be suspended to schedule a new process. Therefore, it is determined by the time quantum and is absolutely preemptive. Both the Priority scheduling algorithm and the Shortest Job First algorithm can be divided into preemptive and non-preemptive versions.
|
2,012 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
The scheduling algorithm with an average turnaround time of 14 is priority scheduling.
|
False
|
When these 5 batch jobs are scheduled using the Shortest Job First scheduling algorithm, the average turnaround time is [2+(2+4)+(2+4+6)+(2+4+6+8)+(2+4+6+8+10)]/5=14. This question mainly tests the reader's understanding of various priority scheduling algorithms. If solved using the method in question 18, it might take some time, but it is worthwhile as it helps to practice the basic methods. Such questions with a large amount of operations and calculations are rarely encountered in exams, so readers need not worry.
|
2,013 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
In process scheduling algorithms, the First-Come, First-Served (FCFS) scheduling algorithm is disadvantageous for short processes.
|
True
|
In the First-Come, First-Served scheduling algorithm, if a long process (job) arrives at the system first, it will cause many subsequent short processes (jobs) to wait for an extended period, thus disadvantaging short processes (jobs).
|
2,014 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
Process synchronization can be achieved without the need for semaphores.
|
False
|
In multiprogramming, the semaphore mechanism is an effective tool for implementing process synchronization and mutual exclusion. The precedence relationship of process execution essentially refers to the synchronization relationship between processes. Besides, concurrent execution of processes does not require semaphore control, hence the correct answer is D.
|
2,015 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
When using the PV operation synchronization mechanism, the value range of semaphore S is 2, 1, 0, and -1.
|
True
|
Since the program segment allows two processes to enter at a time, the maximum value of the semaphore is 2. With at most three processes applying, the minimum value of the semaphore is -1; therefore, the semaphore can take the values 2, 1, 0, -1.
|
2,016 |
Test
|
Operating System
|
Processes and Threads
|
Assertion
|
Reasoning
|
English
|
After acquiring resources, a process can only release them after it has finished using them; this belongs to the non-preemptive condition, which is one of the necessary conditions for deadlock.
|
True
|
After acquiring resources, a process can only release them after they have been used, meaning its resources cannot be preempted by the system. The answer is option C.
|
2,017 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
In storage management, the purpose of adopting overlay and swapping techniques is to achieve main memory sharing.
|
False
| null |
2,018 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
In segmented paging storage management, the address mapping table consists of one page table for each process and one segment table for each segment.
|
False
| null |
2,019 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
After adopting paging or segmentation management, the physical address space provided to users remains the same.
|
False
| null |
2,020 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The management of the external storage swap area should primarily aim to increase the speed of swapping in and out.
|
True
| null |
2,021 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
An operating system manages memory using a paging storage management method, where the size of the pages allocated must be the same.
|
True
| null |
2,022 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The storage management method unsuitable for multiprogramming systems is variable partition allocation.
|
False
| null |
2,023 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
In segmented storage management, storage is divided into segments, with each segment being a contiguous storage area.
|
True
| null |
2,024 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The maximum capacity of virtual memory depends on the address space of the process.
|
False
| null |
2,025 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
In page replacement strategies, the FIFO strategy may lead to thrashing.
|
False
| null |
2,026 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The foundation of the virtual storage management system is the theory of program virtuality.
|
False
| null |
2,027 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The main characteristic of paging virtual memory management is that it does not require loading the entire job into a contiguous area of the main memory at once.
|
True
| null |
2,028 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The storage management that does not produce internal fragmentation is segmented storage management.
|
True
| null |
2,029 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
For the relocation storage management method, a relocation register should be set up throughout the entire system.
|
True
| null |
2,030 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The management of the external storage swap area should primarily aim to enhance system throughput.
|
False
| null |
2,031 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
In the segmented storage management method, each segment is of equal length.
|
False
| null |
2,032 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
Virtual storage technology is a technique to supplement external storage space.
|
False
| null |
2,033 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The main feature of demand paging storage management is the expansion of memory.
|
True
| null |
2,034 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Knowledge
|
English
|
The storage management methods of virtual storage technology include demand paging storage management.
|
True
| null |
2,035 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Reasoning
|
English
|
To implement virtual memory management, corresponding hardware support is required.
|
True
|
Options A and B are obviously incorrect. The size of the addressing space in option C depends on the memory access capability of the hardware, which is generally determined by the width of the address bus. Option D requires hardware and software support for the management of virtual memory, including mechanisms such as demand paging page tables, page fault interrupts, and address translation facilities.
|
2,036 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Reasoning
|
English
|
In the paging storage management scheme, static relocation can be adopted.
|
False
|
In the fixed partitioning method, once a job is loaded, its position does not change, and static relocation can be used. The other three management schemes may change the program's position during execution, and static relocation cannot meet their requirements.
|
2,037 |
Test
|
Operating System
|
Memory Management
|
Assertion
|
Reasoning
|
English
|
Single-user contiguous allocation is a storage management method that is not suitable for multiprogramming systems.
|
True
|
The single-user contiguous allocation method is only suitable for single-user, single-task operating systems and is not applicable to multiprogramming.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.