An operating system also has to be able to service peripheral( ),such as timers,motors,sensors,communicationdevices,disks,etc.All of those can request the attention of the OS( ),i.e.at the time that they want to use the OS,theOS has to make sure it's ready to service the requests.Such a request for attention is called an interrupt.There are twokinds of interrupts:Hardware interrupts and Software interrupts.The result of an inteiTup:is also a triggering of theprocessor,so that it jumps to a(请作答此空)address.Examples of cases where software interrupts appear are perhaps a divide by zero,a memory segmentation fault,etc.So this kind of interrupt is not caused by a hardware event but by a specificmachine language operation code.Many systems have more than one hardware interrupt line,and the hardwaremanufacturer typically assembles all these interrupt lines in an interrupt( ).An Interrupt( )is a piece of hardware that shields the OS from the electronic details of the interrupt lines,so that interrupts can be queued and none of themgets lost.A.randomB.pre-specifiedC.constantD.inknown

An operating system also has to be able to service peripheral( ),such as timers,motors,sensors,communicationdevices,disks,etc.All of those can request the attention of the OS( ),i.e.at the time that they want to use the OS,theOS has to make sure it's ready to service the requests.Such a request for attention is called an interrupt.There are twokinds of interrupts:Hardware interrupts and Software interrupts.The result of an inteiTup:is also a triggering of theprocessor,so that it jumps to a(请作答此空)address.Examples of cases where software interrupts appear are perhaps a divide by zero,a memory segmentation fault,etc.So this kind of interrupt is not caused by a hardware event but by a specificmachine language operation code.Many systems have more than one hardware interrupt line,and the hardwaremanufacturer typically assembles all these interrupt lines in an interrupt( ).An Interrupt( )is a piece of hardware that shields the OS from the electronic details of the interrupt lines,so that interrupts can be queued and none of themgets lost.

A.random
B.pre-specified
C.constant
D.inknown

参考解析

解析:

相关考题:

It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

OS的全称是Operating System。() A.错误B.正确

An embedded operating system is the(71)program that manages all the other programs in an embedded device after initial load of programs by a(an)(72). It normally guarantees a capability within a specified(73)size and(74)constraint as well as with application programs. It also n0rmalty has small foot print including initial boot loader, OS kernel, required device drivers,(75)for the user data and so forth. It has very-likely structure of a normal operating system however mainly differentiated by some factors such as type of pre-installed device, functional limits, taking designed job only.A.hardwareB.businessC.softwareD.external

You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?() A. user@router request system storage cleanupB. user@router show system storageC. user@router request system storage cleanup dry-runD. user@router show system storage detail

Which command gracefully shuts down the Junos OS?() A. request system rebootB. request system logoutC. request system haltD. restart gracefully

Computers with the same ( )can typically use the same software and peripheral devices.A. CPUB. operating systemC. mainboardD. display

Passage 1A concept car developed by Japanese company Nissan has a breathalyzer-like detection system and other instruments that could help keep drunk or over tired drivers off the road.The car's sensors check odors inside the car and monitor a driver's sweat for traces of alcohol. An in-car computer system can issue an alert or even lock up the ignition system if the driver seems over-the-limit. The air odor sensors are fixed' firmly and deeply in the driver and passenger seats, while a detector in the gear-shift knob measures perspiration from the driver's palm.Other carmakers have developed similar detection systems. For example, Sweden's Volvo has developed a breathalyzer attached to a car's seat belt that drivers must blow into before the engine will start.Nissan's new concept vehicle also includes a dashboard-mounted camera that tracks a driver's alertness by monitoring their eyes. It will sound an alarm and issue a spoken warning in Japanese or English if it judges that the driver needs to pull over and rest.The car technology is still in development, but general manager Kazuhiro Doi says the combination of different detection systems should improve the overall effectiveness of the technology."For example, if the gear-shift sensor was bypassed by a passenger using it instead of the driver, the facial recognition system would still be used," Doi says. Nissan has no specific timetable for marketing the system, but aims to use technology to cut the number of fatalities involving its vehicles to half 1995 levels by 2015.The car's seat belt can also tighten if drowsiness is detected, while an external camera checks that the car is keeping to its lane properly. However, Doi admits that some of the technology, such as the alcohol odor sensor, should be improved. "If you drink one beer, it's going to register, so we need to study what's the appropriate level for the system to activate," he says.In the UK, some research groups are using similar advanced techniques to understand driver behavior and the effectiveness of different road designs.查看材料A.It has a sensor system that could issue a warning if the driver is drunk.B.It has sensors that detect traces of alcohol inside the car.C.It has sensors locked up in the ignition system.D.It has a breathalyzer-like detection system.

An operating system also has to be able to service peripheral( ),such as timers,motors,sensors,communicationdevices,disks,etc.All of those can request the attention of the OS( ),i.e.at the time that they want to use the OS,theOS has to make sure it's ready to service the requests.Such a request for attention is called an interrupt.There are twokinds of interrupts:Hardware interrupts and Software interrupts.The result of an inteiTup:is also a triggering of theprocessor,so that it jumps to a( )address.Examples of cases where software interrupts appear are perhaps a divide by zero,a memory segmentation fault,etc.So this kind of interrupt is not caused by a hardware event but by a specificmachine language operation code.Many systems have more than one hardware interrupt line,and the hardwaremanufacturer typically assembles all these interrupt lines in an interrupt(请作答此空).An Interrupt( )is a piece of hardware that shields the OS from the electronic details of the interrupt lines,so that interrupts can be queued and none of themgets lost.A.vectorB.arrayC.queueD.ist

A real-time operating system.(RTOS)is an operating system intended to serve( )application process data as it comes in,typically without buffering delays.A key(请作答此空)of a RTOS is the level of its consistency concerning the amount of time it takes to accept and complete an application’s task;the variability is jitter.A hard real-time operating system has( )jitter than a soft real-time operating system.The chief design goal is not high throughput,but rather a guarantee of a soft or hard performance category.A RTOS has an advanced algorithm for scheduling.( )flexibility enables a wider,computer-system orchestration of process priorities,but a real-time OS is more frequently dedicated to a narrow set of applications.Key factors in a real-time OS are minimal( )latency and minimal thread switching latency.A.characteristicB.programmingC.structureD.computer

The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the ( 请作答此空) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. functional requirements功能需求B. nonfunctional requirements非功能需求C. system constraint系统约束D. system operational environment系统运行环境

“Those users boot up the new OS,they will recognize nothing”(in Para.2) is closest in meaning to ( ) A.those who use Windows are generally not good at using computers B.Apple’s OS is so different from Windows C.Windows is so good that other operating systems can hardly survive D.Windows has been enjoying a monopolistic position in operating system market

The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()A、The database user OPS$SKD will be able to administer the database.B、The authentication detail for the database user OPS$SKD is recorded in the password file.C、The local operating system user SKD will be able to access the database instance without specifying the username and password.D、The database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.

软件系统Operating System,简称OS。()

An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()A、 Gather information from users.B、 Reboot the server.C、 Apply the latest service packs to the operating system.D、 Perform a root cause analysis.

A customer plans to consolidate to high-end enterprise level servers using multiple partitions.  They are evaluating an IBM POWER5 solution for their server consolidation environment.  Which of the following best describes the value of the IBM solution as compared with the competition?()A、The POWER5 system has greater memory and processor granularity and can also run both Linux and AIX at the same time in different LPARs.B、The POWER5 system supports more partitions, processors, and memory than any competitor’s solution.C、The POWER5 system has the lowest partitioning overhead and can also run both Linux and AIX at the same time in different LPARs.D、The POWER5 system supports more partitions and has the lowest partitioning overhead.

Which command gracefully shuts down the Junos OS?()A、request system rebootB、request system logoutC、request system haltD、restart gracefully

Which statement is true regarding the Junos OS?()A、The Junos kernel is based on the Solaris operating system.B、The Junos kernel is based on the GNU Zebra operating system.C、The Junos kernel is completely original and not based on any other operating system.D、The Junos kernel is based on the FreeBSD UNIX operating system.

You issued the following command at the UNIX environment:   % setenv ORA_SDTZ ’OZ_TZ’   What will be the impact of issuing the above command?()  A、 The operating system local time zone will be set for a user session using the operating system environment variable.B、 The database local time zone will be set for a user session using the operating system environment variable.C、 The operating system local time zone will be set for the database using the operating system environmentD、 The database local time zone will be set for the database using the operating system environment variable.

单选题You are maintaining your Oracle10g database in the UNIX environment. An application requires one of the user sessions to exist in the operating system local time zone. You decide to set the time zone for a session using the operating system environment variable. Which command will you issue?()A setenv ORA_SDTZ ’DB_TZ’B setenv ORA_SDTZ ’+10:00’C setenv ORA_SDTZ ’OS-TZ’D setenv ORA_SDTZ ’Europe/London’

单选题A customer plans to consolidate to high-end enterprise level servers using multiple partitions.  They are evaluating an IBM POWER5 solution for their server consolidation environment.  Which of the following best describes the value of the IBM solution as compared with the competition?()AThe POWER5 system has greater memory and processor granularity and can also run both Linux and AIX at the same time in different LPARs.BThe POWER5 system supports more partitions, processors, and memory than any competitor’s solution.CThe POWER5 system has the lowest partitioning overhead and can also run both Linux and AIX at the same time in different LPARs.DThe POWER5 system supports more partitions and has the lowest partitioning overhead.

单选题Which statement is true regarding the Junos OS?()AThe Junos kernel is based on the Solaris operating system.BThe Junos kernel is based on the GNU Zebra operating system.CThe Junos kernel is completely original and not based on any other operating system.DThe Junos kernel is based on the FreeBSD UNIX operating system.

单选题You issued the following command at the UNIX environment:   % setenv ORA_SDTZ ’OZ_TZ’   What will be the impact of issuing the above command?()A The operating system local time zone will be set for a user session using the operating system environment variable.B The database local time zone will be set for a user session using the operating system environment variable.C The operating system local time zone will be set for the database using the operating system environmentD The database local time zone will be set for the database using the operating system environment variable.

单选题An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem. Which of the following should the administrator do prior to escalating the issue?()AGather information from users.BReboot the server.CApply the latest service packs to the operating system.DPerform a root cause analysis

多选题You are asked to free up disk space so you can update your version of the Junos OS.Which two commands display the files that will be removed?()Auser@router request system storage cleanupBuser@router show system storageCuser@router request system storage cleanup dry-runDuser@router show system storage detail

单选题An administrator is troubleshooting a problem on an application server, but has not determined the cause of the problem and is not able to replicate the problem.  Which of the following should the administrator do prior to escalating the issue?()A Gather information from users.B Reboot the server.C Apply the latest service packs to the operating system.D Perform a root cause analysis.

判断题软件系统Operating System,简称OS。()A对B错

多选题You deploy a mobile messaging solution with Microsoft Exchange Server 2003 Service Pack 2.   When the application is running, it must not be able to access protected registry keys.   You need to ensure that the application meets the outlined requirement. What are two possible ways to achieve this goal?()AUse Microsoft Windows Mobile 5.0 Pocket PC Phone Edition operating system.BUse Microsoft Windows Mobile 2003 for Pocket PC operating system.CUse Microsoft Windows Mobile 5.0 for Smartphone operating system.DUse Microsoft Windows Mobile 2003 for Smartphone operating system.

单选题The database instance has the following parameter setting: OS_AUTHENT_PREFIX = OPS$ OS_ROLES = FALSE  REMOTE_OS_AUTHENT = FALSE REMOTE_OS_ROLES = FALSE TIMED_OS_STATISTICS = 0  You have a local operating system user SKD. You create a database user OPS$SKD, and then  assignexternal authentication. The user OPS$SKD has the CREATE SESSION privilege.  What would youachieve by the above process()AThe database user OPS$SKD will be able to administer the database.BThe authentication detail for the database user OPS$SKD is recorded in the password file.CThe local operating system user SKD will be able to access the database instance without specifying the username and password.DThe database user OPS$SKD has to login with the password of the local operating system user SKD to access the database instance.