0% found this document useful (0 votes)
95 views42 pages

Sheets, Banks, Written

Uploaded by

ziadshawky49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views42 pages

Sheets, Banks, Written

Uploaded by

ziadshawky49
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Choose

Assignment 1

1. The __________ contains the data to be written into memory and receives the data read from
memory.

A) I/O address register B) memory address register

C) I/O buffer register D) memory buffer register

2) Instruction processing consists of two steps:

A) fetch and execute B) instruction and execute

C) instruction and halt D) fetch and instruction

3) The ___________ routine determines the nature of the interrupt and

performs whatever actions are needed.

A) interrupt handler B) instruction signal

C) program handler D) interrupt signal

4) __________ is more efficient than interrupt-driven or programmed I/O for a

multiple-word I/O transfer.

A) Spatial locality B) Direct memory access

C) Stack access D) Temporal locality

1. The invention of the ______ was the hardware revolution that brought about desktop and
handheld computing.
A) Cache
B) Microprocessor
C) Multicore Computer
D) Symmetric Multiprocessor
Correct Answer: B) Microprocessor

2. To satisfy the requirements of handheld devices, the classic microprocessor is giving way to
the ______, where not just the CPUs and caches are on the same chip, but also many of the
other components of the system, such as DSPs, GPUs, I/O devices, and main memory.
A) Cache Memory
B) Instruction Register
C) System on a Chip (SoC)
D) Interrupt

Correct Answer: C) System on a Chip (SoC)

3. The processing required for a single instruction is called a(n) ______ cycle.
A) Cache
B) Instruction Fetch
C) Basic Instruction Cycle
D) Interrupt Cycle

Correct Answer: C) Basic Instruction Cycle

4. The fetched instruction is loaded into the ______.


A) Program Counter
B) Instruction Register (IR)
C) Stack Pointer
D) Mapping Function

Correct Answer: B) Instruction Register (IR)

5. When an external device is ready to accept more data from the processor, the I/O module for
that external device sends an ______ signal to the processor.
A) Execution
B) Cache
C) Interrupt
D) Stack

Correct Answer: C) Interrupt

6. The ______ is a device for staging the movement of data between main memory and
processor registers to improve performance and is not usually visible to the programmer or
processor.
A) Cache
B) Secondary Memory
C) System Bus
D) Program Counter

Correct Answer: A) Cache

7. External, nonvolatile memory is also referred to as ______ or auxiliary memory.


A) Cache
B) Secondary Memory
C) Instruction Register
D) Binary

Correct Answer: B) Secondary Memory

8. When a new block of data is read into the cache, the ______ determines which cache location
the block will occupy.
A) Mapping Function
B) Interrupt Handler
C) Memory Hierarchy
D) Control Unit

Correct Answer: A) Mapping Function

9. In a ______ multiprocessor, all processors can perform the same functions so the failure of a
single processor does not halt the machine.
A) Multicore
B) Symmetric Multiprocessor (SMP)
C) Digital Signal Processor (DSP)
D) Programmed I/O

Correct Answer: B) Symmetric Multiprocessor (SMP)

10. A ______ computer combines two or more processors on a single piece of silicon.
A) Microprocessor
B) Multicore Computer
C) System on a Chip (SoC)
D) Instruction Fetch

Correct Answer: B) Multicore Computer


11. A Control/Status register that contains the address of the next instruction to be fetched is
called the ______.
A) Program Counter
B) Cache
C) Instruction Register
D) General Purpose Register

Correct Answer: A) Program Counter

12. Each location in Main Memory contains a ______ value that can be interpreted as either an
instruction or data.
A) Binary
B) Decimal
C) Cache
D) Hexadecimal

Correct Answer: A) Binary

13. A special type of address register required by a system that implements user-visible stack
addressing is called a ______.
A) Program Counter
B) Stack Pointer
C) Instruction Register
D) Cache

Correct Answer: B) Stack Pointer

14. Registers that are used by system programs to minimize main memory references by
optimizing register use are called ______.
A) Cache
B) General Purpose
C) Secondary Memory
D) System Bus

Correct Answer: B) General Purpose

15. The concept of multiple programs taking turns in execution is known as ______.
A) Cache Design
B) Multiprogramming
C) Symmetric Multiprocessing
D) Interrupt
Correct Answer: B) Multiprogramming

Assignment 2

1. An _________ is a program that controls the execution of application programs and acts as an
interface between applications and the computer hardware.
A) Monitor
B) Operating System (OS)
C) Scheduler
D) Virtual Memory

Correct Answer: B) Operating System (OS)

2. The portion of the monitor that is always in main memory and available for execution is
referred to as the _________.
A) Timer
B) Resident Monitor
C) Scheduler
D) Batch Processor

Correct Answer: B) Resident Monitor

3. __________ is a technique in which a process, executing an application, is divided into threads


that can run concurrently.
A) Multiprogramming
B) Multithreading
C) Batch Processing
D) Time Sharing

Correct Answer: B) Multithreading

4. Two major problems with early serial processing systems were scheduling and _________.
A) Efficiency
B) Setup Time
C) Fairness
D) Resource Allocation

Correct Answer: B) Setup Time

5. The central idea behind the simple batch-processing scheme is the use of a piece of software
known as the __________.
A) Scheduler
B) Monitor
C) Timer
D) Operating System

Correct Answer: B) Monitor

6. Any resource allocation and scheduling policy must consider three factors: fairness, differential
responsiveness, and _________.
A) Setup Time
B) Efficiency
C) Multithreading
D) Availability

Correct Answer: B) Efficiency

7. A _________ is set at the beginning of each job to prevent any single job from monopolizing
the system.
A) Monitor
B) Timer
C) Scheduler
D) Thread

Correct Answer: B) Timer

8. The OS has five principal storage management responsibilities: process isolation, automatic
allocation and management, support of modular programming, protection and access control,
and __________.
A) Virtual Memory
B) Efficiency
C) Long-Term Storage
D) Batch Processing

Correct Answer: C) Long-Term Storage


9. The earliest computers employed __________ processing, a name derived from the way users
have access to the systems.
A) Batch
B) Serial
C) Multiprogramming
D) Real-Time

Correct Answer: B) Serial

10. __________ was designed to keep the processor and I/O devices, including storage devices,
simultaneously busy to achieve maximum efficiency.
A) Multiprogramming/Multitasking
B) Virtual Memory
C) Serial Processing
D) Resource Allocation

Correct Answer: A) Multiprogramming/Multitasking

11. In a time-sharing, multiprogramming system, multiple users simultaneously access the system
through __________.
A) Terminals
B) Batch Processing
C) Virtual Memory
D) Resident Monitors

Correct Answer: A) Terminals

12. The principal objective of __________ is to maximize processor use.


A) Virtual Memory
B) Batch Multiprogramming
C) Time Sharing
D) Resource Allocation

Correct Answer: B) Batch Multiprogramming

13. Three major lines of computer system development created problems in timing and
synchronization that contributed to the development of the concept of the process:
multiprogramming batch operation, time sharing, and __________.
A) Compatible Time-Sharing System (CTSS)
B) Real-Time Transaction Systems
C) Virtual Memory Systems
D) Resident Monitors
Correct Answer: A) Compatible Time-Sharing System (CTSS)

14. __________ is a facility that allows programs to address memory from a logical point of view,
without regard to the amount of main memory physically available.
A) Time Sharing
B) Multithreading
C) Virtual Memory
D) Cache Memory

Correct Answer: C) Virtual Memory

15. Security and protection as they relate to operating systems is grouped into four categories:
Availability, Data Integrity, Authenticity, and __________.
A) Confidentiality
B) Efficiency
C) Multithreading
D) Fairness

Correct Answer: A) Confidentiality

16. The technique where a system clock generates interrupts, and at each clock interrupt the OS
regains control and assigns the processor to another user, is __________.

A. time slicing

B. multithreading

C. round robin

D. clock cycle
17. __________ is where the OS must prevent independent processes from interfering with each
other's memory, both data and instructions.

A. Support of modular programming

B. Process isolation

C. Automatic allocation and management

D. Protection and access control

18. A special type of programming language used to provide instructions to the monitor is
__________.

A. FPL

B. JCL

C. DML

D. SML

Assignment 3
1) A process is in the ___________ state when it is in secondary memory and awaiting an event.
a) Ready
b) Running
c) Suspend
d) Blocked

Answer: c

2) Two essential elements of a process are ___________ and a set of data associated with that code.
a) Input and output
b) Program code
c) Control table
d) Scheduler

Answer: b

3) The ___________ tables provide information about the existence of files, their location on secondary
memory, their current status, and other attributes.
a) File
b) Memory
c) Process
d) Scheduler

Answer: a

4) A significant point about the ___________ is that it contains sufficient information so that it is
possible to interrupt a running process and later resume execution as if the interruption had not
occurred.
a) Memory table
b) Process control block
c) Scheduler
d) Dispatcher

Answer: b

5) When the OS creates a process at the explicit request of another process, the action is referred to as
___________.
a) Termination
b) Scheduling
c) Process spawning
d) Dispatching

Answer: c

6) The process is said to be operating in a ___________ fashion if each process in the queue is given a
certain amount of time, in turn, to execute and then returned to the queue, unless blocked.
a) Random
b) Sequential
c) Round-robin
d) Parallel

Answer: c

7) A process in the ___________ state is in main memory and available for execution.
a) Blocked
b) Ready
c) Suspended
d) Running

Answer: b

8) ___________ tables are used to keep track of both main (real) and secondary (virtual) memory.
a) File
b) Memory
c) Scheduler
d) Process

Answer: b

9) The process control block information can be grouped into three general categories: process
identification, ___________, and process control information.
a) Trace
b) Process state information
c) Memory allocation
d) File status

Answer: b

10) A ___________ is the maximum amount of time that a process can execute before being interrupted.
a) Scheduler
b) Quantum
c) Time slice
d) Process ID

Answer: c

11) The principal function of the OS is to create, manage, and ___________ processes.
a) Dispatch
b) Interrupt
c) Terminate
d) Schedule

Answer: c

12) The portion of the operating system that selects the next process to run is called the ___________.
a) Memory manager
b) Scheduler (or dispatcher)
c) Trace manager
d) Process controller

Answer: b

13) The collection of program, data, stack, and attributes is referred to as the ___________.
a) Trace
b) Control block
c) Process image
d) Dispatcher

Answer: c

14) A process is in the ___________ state when it is in main memory and awaiting an event.
a) Suspend
b) Blocked
c) Ready
d) Running

Answer: b

15) We can characterize the behavior of an individual process by listing the sequence of instructions,
referred to as a ___________, that executes for that process.
a) Process image
b) State information
c) Trace
d) Time slice

Answer: c

16) An error or exception condition generated within the currently running process is ___________.
a) Time slice
b) Trap
c) Scheduler
d) Dispatcher

Answer: b

17) An error or exception condition generated within the currently running process is:

a) Interrupt
b) Trap
c) Exception
d) Signal

b) Trap
Assignment 4

1. Which feature allows controlled access to shared memory?


a) Paging
b) Segmentation
c) Mutex
d) Locking
‫اإلجابة الصحيحة‬: a) Paging

2. Which tool is most effective in organizing memory logically?


a) Paging
b) Segmentation
c) Allocation
d) Fragmentation
‫اإلجابة الصحيحة‬: b) Segmentation

3. What is a disadvantage of fixed partitioning?


a) External fragmentation
b) Internal fragmentation
c) Overhead
d) Compaction requirement
‫اإلجابة الصحيحة‬: b) Internal fragmentation

4. In dynamic partitioning, how is memory allocated?


a) In fixed-size blocks
b) In a circular manner
c) Exactly as required by the process
d) In equal parts to all processes
‫اإلجابة الصحيحة‬: c) Exactly as required by the process

5. Which placement algorithm selects the smallest partition that fits a process?
a) Best fit
b) First fit
c) Worst fit
d) Next fit
‫اإلجابة الصحيحة‬: a) Best fit

6. How can external fragmentation be reduced?


a) Using dynamic partitioning
b) Using fixed partitioning
c) By reallocating memory statically
d) By removing unused memory
‫اإلجابة الصحيحة‬: a) Using dynamic partitioning

7. What is internal fragmentation?


a) Unused memory between partitions
b) Wasted space outside allocated memory blocks
c) Wasted space within allocated memory blocks
d) Memory shared among processes
‫اإلجابة الصحيحة‬: c) Wasted space within allocated memory blocks

8. What is the purpose of compaction in memory management?


a) To allocate more memory to processes
b) To merge unused memory spaces
c) To allocate memory dynamically
d) To protect memory from errors
‫اإلجابة الصحيحة‬: b) To merge unused memory spaces

9. What happens when a process is swapped back into memory in a dynamic partitioning
system?
a) It overwrites the old process
b) It may be relocated to a new partition
c) It must be assigned to its original partition
d) It gets suspended until more memory is available
‫اإلجابة الصحيحة‬: b) It may be relocated to a new partition

10. Which memory management feature enables the relocation of a process to a different
memory location?
a) Segmentation
b) Paging
c) Relocation
d) Fragmentation
‫اإلجابة الصحيحة‬: c) Relocation
11. In a dynamic partitioning system with fragmentation, what technique can resolve the issue of
a new process needing 100 MB of memory?
a) First fit
b) Compaction
c) Paging
d) Segmentation
‫اإلجابة الصحيحة‬: b) Compaction

12. Which placement algorithm searches for the first available memory block large enough to
accommodate a process?
a) First fit
b) Best fit
c) Worst fit
d) Next fit
‫اإلجابة الصحيحة‬: a) First fit

13. What type of fragmentation occurs when a process occupies a partition smaller than its size
due to fragmentation, causing some data to be left out?
a) Internal
b) External
c) Relocation
d) Logical
‫اإلجابة الصحيحة‬: a) Internal

14. With a first-fit algorithm in a system with 4 partitions of sizes 4 MB, 6 MB, 8 MB, and 10 MB, a
7 MB process will be assigned to the:
a) 4 MB partition
b) 6 MB partition
c) 8 MB partition
d) 10 MB partition
‫اإلجابة الصحيحة‬: c) 8 MB partition

15. In a fixed partitioning system with 5 MB partitions, if 3 processes of sizes 3 MB, 2 MB, and 6
MB arrive, how many processes can be allocated?
a) 1
b) 2
c) 3
d) 4
‫اإلجابة الصحيحة‬: b) 2

16. In a dynamic partitioning system using the best-fit algorithm, for a process of size 12 MB
among the available partitions: 10 MB, 15 MB, 20 MB, the chosen partition will be:
a) 10 MB
b) 15 MB
c) 20 MB
d) None of the above
‫اإلجابة الصحيحة‬: a) 10 MB
Assignment 5

1 What is the page number for the logical address 765432 in a system with an 8 KB page size?
a) 93
b) 95
c) 94
d) 96
‫اإلجابة الصحيحة‬: a) 93

2 If frame number 300 is assigned to page 93, what is the physical address of logical address 765432?
a) 2,457,360
b) 2,457,72
c) 2,460,360
d) 2,460,600
‫اإلجابة الصحيحة‬: a) 2,457,360

3 How many pages are required for a process of size 1.2 MB with an 8 KB page size?
a) 150
b) 151
c) 152
d) 149
‫اإلجابة الصحيحة‬: None of the options provided. However, if rounding down, C) 152 is the closest.

4 How many frames are there in a system with 4 GB of memory and 8 KB frame size?
a) 524,288
b) 1,048,576
c) 262,144
d) 1,572,864
‫اإلجابة الصحيحة‬: a) 524,288

5 How many bits are required to represent the page number for a process with 151 pages?
a) 6
b) 7
c) 8
d) 9
‫اإلجابة الصحيحة‬: c) 8

6 What is the number of bits required to represent the offset for a page size of 16 KB?
a) 12 bits
b) 13 bits
c) 14 bits
d) 15 bits
‫اإلجابة الصحيحة‬: c) 14 bits

7 What is the physical address for logical address 567890 if the page number is 69, offset is 567, and
the frame number is 3069?
a) 25,150,567
b) 25,152,567
c) 25,154,567
d) 25,156,567
‫اإلجابة الصحيحة‬: b) 25,152,567
8 A segment table has the following entry: Segment 0: Base = 3000, Limit = 1500. What is the physical
address for the logical address (0,1200)?
a) 4200
b) 3000
c) 3100
d) 4200
‫اإلجابة الصحيحة‬: a) 4200

9 What is the total logical address space for a system with the following segment table:

 Segment 0: Limit = 2000

 Segment 1: Limit = 3000

 Segment 2: Limit = 1500


a) 5500
b) 6000
c) 6500
d) 7000
‫اإلجابة الصحيحة‬: a) 6500
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 1

Chapter 1 – Computer Systems Overview

TRUE/FALSE QUESTIONS:

T F 1) The processor controls the operation of the computer and performs its
data processing functions.

T F 2) It is not possible for a communications interrupt to occur while a printer


interrupt is being processed.

T F 3) A system bus transfers data between the computer and its external environment.

T F 4) Cache memory is invisible to the OS.

T F 5) With interrupts, the processor can not be engaged in executing other instructions
while an I/O operation is in progress.

T F 6) Digital Signal Processors deal with streaming signals such as audio and video.

T F 7) The fetched instruction is loaded into the Program Counter.

T F 8) Interrupts are provided primarily as a way to improve processor utilization.

T F 9) The interrupt can occur at any time and therefore at any point in the execution
of a user program.

T F 10) Over the years memory access speed has consistently increased more rapidly
than processor speed.

T F 11) An SMP can be defined as a stand-alone computer system with two or more similar
processors of comparable capability.

T F 12) The Program Status Word contains status information in the form of condition codes,
which are bits typically set by the programmer as a result of program operation.

T F 13) An example of a multicore system is the Intel Core i7.

T F 14) In a two-level memory hierarchy the Hit Ratio is defined as the fraction of all
memory accesses found in the slower memory.

T F 15) The operating system acts as an interface between the computer hardware and
the human user.

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 12:04:23 GMT -05:00

https://www.coursehero.com/file/82565254/Chapter1-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 1

MULTIPLE CHOICE QUESTIONS:

1) The four main structural elements of a computer system are:

A) Processor, Main Memory, I/O Modules and System Bus

B) Processor, I/O Modules, System Bus and Secondary Memory

C) Processor, Registers, Main Memory and System Bus

D) Processor, Registers, I/O Modules and Main Memory

2) The __________ holds the address of the next instruction to be fetched.

A) Accumulator (AC) B) Instruction Register (IR)

C) Instruction Counter (IC) D) Program Counter (PC)

3) The __________ contains the data to be written into memory and receives the data
read from memory.

A) I/O address register B) memory address register

C) I/O buffer register D) memory buffer register

4) Instruction processing consists of two steps:

A) fetch and execute B) instruction and execute

C) instruction and halt D) fetch and instruction

5) The ___________ routine determines the nature of the interrupt and performs whatever
actions are needed.

A) interrupt handler B) instruction signal

C) program handler D) interrupt signal

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 12:04:23 GMT -05:00

https://www.coursehero.com/file/82565254/Chapter1-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 1

6) The unit of data exchanged between cache and main memory is __________ .

A) block size B) map size

C) cache size D) slot size

7) The _________ chooses which block to replace when a new block is to be loaded into the
cache and the cache already has all slots filled with other blocks.

A) memory controller B) mapping function

C) write policy D) replacement algorithm

8) __________ is more efficient than interrupt-driven or programmed I/O for a


multiple-word I/O transfer.

A) Spatial locality B) Direct memory access

C) Stack access D) Temporal locality

9) The __________ is a point-to-point link electrical interconnect specification that enables


high-speed communications among connected processor chips.

A) QPI B) DDR3

C) LRUA D) ISR

10) Small, fast memory located between the processor and main memory is called:

A) Block memory B) Cache memory

C) Direct memory D) WORM memory

11) In a uniprocessor system, multiprogramming increases processor efficiency by:

A) Taking advantage of time wasted by long wait interrupt handling

B) Disabling all interrupts except those of highest priority

C) Eliminating all idle processor cycles

D) Increasing processor speed

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 12:04:23 GMT -05:00

https://www.coursehero.com/file/82565254/Chapter1-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 1

12) The two basic types of processor registers are:

A) User-visible and user-invisible registers

B) Control and user-invisible registers

C) Control and Status registers

D) User-visible and Control/Status registers

13) When an external device becomes ready to be serviced by the processor the device
sends a(n) _________ signal to the processor.

A) access B) halt

C) handler D) interrupt

14) One mechanism Intel uses to make its caches more effective is __________ , in which the
hardware examines memory access patterns and attempts to fill the caches speculatively
with data that is likely to be requested soon.

A) mapping B) handling

C) interconnecting D) prefetching

15) A __________ organization has a number of potential advantages over a uniprocessor


organization including performance, availability, incremental growth, and scaling.

A) temporal locality B) symmetric multiprocessor

C) direct memory access D) processor status word

SHORT ANSWER QUESTIONS:

microprosessor
1) The invention of the _________ was the hardware revolution that brought about desktop and
handheld computing.

2) To satisfy the requirements of handheld devices, the classic microprocessor is giving way to the
soc_________ , where not just the CPUs and caches are on the same chip, but also many of the other
components of the system, such as DSPs, GPUs, I/O devices and main memory.

3) The processing required for a single instruction is called a(n) __________


instruction cycle.

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 12:04:23 GMT -05:00

https://www.coursehero.com/file/82565254/Chapter1-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 1

4) The fetched instruction is loaded into the __________


instruction .register

5) When an external device is ready to accept more data from the processor, the I/O module for
that external device sends an __________ signal to the processor.
interrupt request
6) The __________
cashe is a device for staging the movement of data between main memory and processor
registers to improve performance and is not usually visible to the programmer or processor.
secondary memory
7) External, nonvolatile memory is also referred to as __________ or auxiliary memory.
mapping function
8) When a new block of data is read into the cache the __________ determines which cache location
the block will occupy.

symmrtricmultiprocessor all processors can perform the same functions so the failure of a
9) In a _________
single processor does not halt the machine.

10) A __________
multicore computer combines two or more processors on a single piece of silicon.

11) A Control/Status register that contains the address of the next instruction to be fetched is
called the _________.
program counter
binary
12) Each location in Main Memory contains a _________ value that can be interpreted as either
an instruction or data.

13) A special type of address register required by a system that implements user visible stack
addressing is called a __________ .
stack pointer

14) Registers that are used by system programs to minimize main memory references by optimizing
register use are called __________ .
general ,public regisrers

15) The concept of multiple programs taking turns in execution is known as __________.

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 12:04:23 GMT -05:00

https://www.coursehero.com/file/82565254/Chapter1-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 1

Chapter 1 – Computer Systems Overview


Answer Key

TRUE/FALSE QUESTIONS:

1. T
2. F
3. F
4. T
5. F
6. T
7. F
8. T
9. T
10. F
11. T
12. F
13. T
14. F
15. T

MULTIPLE CHOICE QUESTIONS:

1. A
2. D
3. D
4. A
5. A
6. A
7. D
8. B
9. A
10. B
11. A
12. D
13. D

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 12:04:23 GMT -05:00

https://www.coursehero.com/file/82565254/Chapter1-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 1

14. D
15. B

SHORT ANSWER QUESTIONS:

1. microprocessor
2. System on a Chip (SoC)
3. instruction
4. Instruction Register (IR)
5. interrupt request
6. cache
7. secondary memory
8. mapping function
9. symmetric
10. multicore
11. Program Counter (PC)
12. binary number
13. stack pointer
14. user-visible registers
15. multiprogramming

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 12:04:23 GMT -05:00

https://www.coursehero.com/file/82565254/Chapter1-TextbookBankpdf/
Powered by TCPDF (www.tcpdf.org)
lOMoARcPSD|10561492

Testbank Chapter 2 Operating Systems, Questions &


Answers
Operating Systems (Douglas College)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Doaa Abdalla El Sayed (dabdallh20@gmail.com)
lOMoARcPSD|10561492

Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 2

Chapt
er2–Oper
ati
ngSys
tem Over
view

TRUE/
FALSEQUESTI
ONS:

T F 1)AnOSs houldbeconst
ruct
edinsuchawa yast
opermi
ttheeffe
cti
ve
devel
opme nt
,te
sti
ng,andint
roduc
tionofnewsys
temf
uncti
onswi thout
int
erf
eri
ngwi t
hs e
rvi
ce.

T F 2)TheOSmaskst
hedet
ail
soft hehar
dwarefrom theprogramme randpr
ovi
des
t
hepr
ogr
amme rwi
thac onveni
entint
erf
aceforusi
ngt hesys
tem.

T F 3)TheABIgive
saprogr
am acc
esstot
hehar
dwar
ere
sour
cesands
ervi
cesa
vai
labl
e
i
nasyst
emt hr
oughtheus
erISA.

T F 4)TheOSfre
quent
lyr
eli
nqui
she
scont
rolandmus
tde
pendont
hepr
oce
ssort
oal
low
i
ttor
egai
ncont
rol
.

T F 5)Oneofthedrivi
ngforc
esinoper
ati
ngs
yst
eme
vol
uti
oni
sadvanc
eme
nti
nthe
under
lyinghardwaret
echnol
ogy.

T F 6)Theproc
essori
tse
lfi
snotar
esourc
es ot
heOSisnotinvol
vedi
ndeter
mini
nghow
muchoftheproc
ess
orti
meisdevote
dtothee
xecuti
onofauserpr
ogram.

T F 7)Aproc
esscons
ist
soft
hre
ec omponent
s:anexec
utabl
eprogram,theas
soc
iat
ed
da
taneede
dbyt hepr
ogram,andtheexe
cut
ionconte
xtoftheprogr
am.

T F 8)Unipr
ogrammingtypi
cal
lypr
ovi
desbe
tte
rut
il
iza
tionofs
yst
emr
esour
cest
han
mult
ipr
ogramming.

T F 9)Amonol
it
hickerne
lisi
mpl
eme
nte
dasas
ingl
epr
oce
sswi
thal
lel
eme
ntss
har
ing
t
hesameaddre
ssspace
.

T F 10)Theus
erhasdi
rec
tac
ces
stot
hepr
oce
ssorwi
thaba
tch-
proc
ess
ingt
ypeofOS.

T F 11)Bot
hba
tchpr
oce
ssi
ngandt
ime
-shar
ingus
emul
ti
progr
ammi
ng.

T F 12)Thephr
ase"contr
olispasse
dt oajob"me
ansthatt
hepr
oce
ssori
snow f
etc
hing
andexe
cuti
ngi ns
truct
ionsfrom t
hemonit
orprogr
am.

T F 13)I
nat i
me-shar
ingsyst
em,auser'
sprogram i
spr
eempt
edatre
gul
ari
nte
rval
s,
butduetorel
ati
vel
yslow humanre
ac t
ionti
methi
socc
urr
encei
sus
uall
y
tr
anspar
enttotheuser
.

T F 14)Thepr
inc
ipl
eobj
ect
iveofBa
tchMul
ti
progr
ammi
ngi
stomi
nimi
zer
espons
eti
me.

T F 15)Vir
tual
izati
ontec
hnologyenabl
esasingl
ePCors erve
rtosi
mul
tane
ous
lyr
un
mult
ipleoper
ati
ngsyste
msormul t
ipleses
sionsofasi
ngl
eOS.

Downloaded by Doaa Abdalla El Sayed (dabdallh20@gmail.com)


lOMoARcPSD|10561492

Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 2

MULTI
PLECHOI
CEQUESTI
ONS:

1)The__________i
sthei
nte
rfac
etha
tist
heboundar
ybe
twe
enhar
dwar
eands
oft
war
e.

A)ABI B)I
SA

C)I
AS D)API

2)A(n)__________isasetofre
sour
cesf
ort
hemove
ment
,st
ora
ge,andpr
oce
ssi
ngofda
taandf
or
thecontrolofthe
sefuncti
ons.

A)ar
chi
tec
tur
e B)pr
ogr
am

C)c
omput
er D)appl
ica
tion

3)Theoperat
ings
yst
em'
s__________re
ferst
oitsi
nhe
rentfle
xibi
li
tyi
npe
rmi
tt
ingf
unc
tional
modific
ati
onst
othes
yst
em wi t
houtint
erf
eri
ngwit
hs e
rvice.

A)e
ffic
ienc
y B)abi
li
tyt
oevol
ve

C)c
ont
rol
ledac
ces
s D)c
onve
nie
nce

4)Ope
rat
ings
yst
emsmus
tevol
veove
rti
mebe
caus
e:

A)ne
w har
dwar
eisde
signe
dandi
mpl
eme
nte
dint
hec
omput
ers
yst
em

B)har
dwar
emus
tber
epl
ace
dwhe
nitf
ail
s

C)har
dwar
eishi
erar
chi
cal

D)us
erswi
llonl
ypur
chas
esof
twar
etha
thasac
urr
entc
opyr
ightda
te

5)Aspecialtypeofpr
ogr
ammi
ngl
angua
geus
edt
opr
ovi
dei
nst
ruc
tionst
othemoni
tor
is__________.

A)FPL B)J
CL

C)DML D)SML

6)Hardwarefeat
ure
sdesi
rabl
einabat
ch-pr
oces
singoperati
ngsys
temi
ncl
udeme
mor
y
pr
otec
tion,t
imer
,pr
ivi
lege
dinst
ruc
tions
,and__________.

Downloaded by Doaa Abdalla El Sayed (dabdallh20@gmail.com)


lOMoARcPSD|10561492

Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 2

A)c
loc
kcyc
les B)as
soc
iat
edda
ta

C)i
nte
rrupt
s D)ke
rne
ls

7)Auserprogr
am exec
utesi
na__________,i
nwhichcert
ainar
easofmemor
yar
epr
ote
cte
d
f
rom theuse
r'sus
e,andinwhi
chc er
taini
nstr
uct
ionsmaynotbeexe
cut
ed.

A)ke
rne
lmode B)us
ermode

C)t
askmode D)ba
tchmode

8)Multi
programmingope
rat
ings
yst
emsar
efai
rl
ysophi
sti
cat
edc
ompar
edt
osi
ngl
e-pr
ogr
am
or_________s
yste
ms.

A)uni
progr
ammi
ng B)t
ime
-shar
ing

C)mul
ti
tas
king D)me
mor
ymana
geme
nt

9)Oneoft
hefir
stt
ime
-shar
ingope
rat
ings
yst
emst
obede
vel
ope
dwast
he__________.

A)Compa
tibl
eTi
me-Shar
ingS
yst
em B)Re
alTi
meTr
ans
act
ionS
yst
em

C)Mul
ti
ple
-Ac
ces
sSys
tem D)Mul
ti
progr
ammi
ngOpe
rat
ionS
yst
em

10)Thetechni
quewhereasyst
emc lockgener
ate
sint
errupt
s,anda teachcl
ocki
nte
rruptt
heOS
regai
nscontr
olandas
signstheproces
sortoanot
heruser
,is__________.

A)t
imes
lic
ing B)mul
ti
thr
eadi
ng

C)r
oundr
obi
n D)c
loc
kcyc
le

11)The__________i
sthei
nte
rnalda
tabywhi
cht
heOSi
sabl
etos
upe
rvi
seandc
ont
rolt
hepr
oce
ss.

A)e
xec
utabl
epr
ogr
am B)as
soc
iat
edda
ta

C)nuc
leus D)e
xec
uti
onc
ont
ext

12)__________i
swheretheOSmus
tpreve
ntinde
pende
ntpr
oce
sse
sfr
om i
nte
rfe
ringwi
the
ach
other'
sme mory
,bothdat
aandi
nst
ruct
ions
.

A)Suppor
tofmodul
arpr
ogr
ammi
ng B)Pr
oce
ssi
sol
ati
on

C)Aut
oma
tical
loc
ati
onandmana
geme
nt D)Pr
ote
cti
onandac
ces
scont
rol

13)__________i
sconc
erne
dwi
tht
hepr
ope
rve
rific
ati
onoft
hei
dent
it
yofus
ersandt
heval
idi
ty

Downloaded by Doaa Abdalla El Sayed (dabdallh20@gmail.com)


lOMoARcPSD|10561492

Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 2

ofme
ssa
gesorda
ta.

A)Avai
labi
li
ty B)Confide
nti
ali
ty

C)Aut
hent
ici
ty D)Da
tai
nte
gri
ty

14)Acommons tr
ategytogi
vee
achpr
oce
ssi
ntheque
ues
omet
imei
ntur
nisr
efe
rre
dtoas
a__________tec
hnique.

A)mul
ti
thr
eadi
ng B)r
ound-r
obi
n

C)t
imes
lic
ing D)s
eri
alpr
oce
ssi
ng

15)Thekeytot
hesucce
ssofLi
nuxhasbeeni t
schar
act
erasaf
rees
oft
war
epac
kagea
vai
labl
e
unde
rtheaus
pic
e(支持)ofthe___________.

A)Wor
ldWi
deWe
bCons
ort
ium B)Fr
eeSof
twar
eFounda
tion

C)Be
rke
leySof
twar
eDi
str
ibut
ion D)GNUPubl
icLi
cens
e

SHORTANSWERQUESTI
ONS:

1.1)An____ope
rat
ings
yst
em(
OS)
______isapr
ogram tha
tcontr
olst
heexecut
ionofappl
ica
tionprogr
amsand
ac
tsasani
nte
r f
acebetwee
napplic
ati
onsandthecomput e
rhardwar
e.

2)Theport
ionoft
hemoni t
ortha
tisa
lwa
ysi
nmai nme mor
yanda
vai
labl
efore
xec
uti
on
i
sref
err
edtoasthe___res
identmonit
or______.

3)___Mul tit
hr eading
_______isatechniquei
nwhichaproce
ss,e
xec
uti
nganappl
ica
tion,i
sdi
vide
dint
o
t
hreadsthatcanrunconc
urre
ntl
y(同时) .

4)Twoma
jorpr
obl
emswi
the
arl
yse
rialpr
oce
ssi
ngs
yst
emswe
res
che
dul
ingand
s
et-
upt
ime
__________.

5)Thecent
rali
deabehi
ndt
hesi
mpl eba
tch-pr
oce
ssi
ngs
che
mei
stheus
eofapi
eceofs
oft
war
e
knownasthe___moni
tor
______.

6)Anyr e
sour c
ealloc
ationandschedul
ingpolicymus
tcons
ide
rthr
eef
act
ors
:Fai
rne
ss,
Diffe
renti
alresponsi
vene
ss,and___Effici
enc
y
_______.

7)A___t
ime r
_______i
sseta
tthebe
ginni
ngofe
achj
obt
opr
eve
ntanys
ingl
ejobf
rom
monopol
izi
ngthesys
tem.

8)TheOShasfivepr
inc
ipals
tor
agemana
geme
ntr
espons
ibi
li
ti
es:pr
oce
ssi
sol
ati
on,aut
oma
tic

Downloaded by Doaa Abdalla El Sayed (dabdallh20@gmail.com)


lOMoARcPSD|10561492

Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 2

all
oca
tionandmanage
ment,s
uppor tofmodul
arpr
ogr
ammi
ng,pr
ote
cti
onandac
ces
scont
rol
,
and____long-
ter
ms tor
age ______.

9)Theear
li
estc
omputer
semployed__s
eri
al________pr
oce
ssi
ng,anamede
rive
dbyt
hewa
y
theuse
rshaveacc
esst
othes
ys t
ems.

10)___Mult
iprogrammi ng_______wasdesignedt
oke
ept
hepr
oce
ssorandI
/O de
vic
es,i
ncl
udi
ngs
tor
agede
vi
si
mul t
ane
ousl
ybusytoac
hievemaxi mum e
ffic
ienc
y.

11)I
nat
ime har
-s i
ng,mul
ti
programmi ngsystem,mul
ti
pleus
erss
imul
tane
ous
lyac
ces
sthe
s
yst
e mt ought
hr e
rmi nals__________.

12)Theprinc
ipalobj
ect
iveofBa
tchmul
ti
progr
ammi
ng__________i
stomaxi
mize
proce
ssoruse.

13)Threema j
orli
nesofcomputersyst
em devel
opme ntcre
ate
dpr obl
emsint i
mi ngand
s
ynchr oniza
tiontha
tcont
ributedtothedevel
opme ntoft
hec onc
eptofthepr oc
ess
:
multi
progr ammi ngbat
choperat
ion,ti
mes har
ing,and_real-t
imet ransaction
systems _________.

14)Virtualme mory___________isafac
ili
tytha
tal
lowsprogr
amst
oaddr
essmemor y
fr
om alogic
alpoi
ntofvi
ew,wi thoutre
gardtotheamountofmainme
moryphys
ical
ly
avai
labl
e.

15)Se
cur
ityandpr
ote
cti
onasi
tre
lat
est
oope
rat
ings
yst
emsi
sgr
oupe
dint
ofourc
ate
gor
ies
:
Avai
labi
li
ty,Da
tai
nte
gri
ty,Aut
hent
ici
tyand__Co
, nfide
nti
ali
t 保密)
y( ________.

Downloaded by Doaa Abdalla El Sayed (dabdallh20@gmail.com)


Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 3

Chapter 3 – Process Description and Control

TRUE/FALSE QUESTIONS:

T F 1) A computer platform consists of a collection of hardware resources, such as the


processor, main memory, I/O modules, timers, and disk drives.

T F 2) For efficiency, applications should be written directly for a given hardware platform.

T F 3) A design change in the structure or semantics of the process control block could affect
a number of modules in the OS.

T F 4) The process control block is the key tool that enables the OS to support multiple
processes and to provide for multiprocessing.

T F 5) It is not the responsibility of the operating system to control the execution of processes.

T F 6) The first step in designing an OS to control processes is to describe the behavior that we
would like the processes to exhibit.

T F 7) The OS may create a process on behalf of an application.

T F 8) Swapping is not an I/O operation so it will not enhance performance.

T F 9) If a system does not employ virtual memory each process to be executed must be fully
loaded into main memory.

T F 10) A process that is not in main memory is immediately available for execution, regardless
of whether or not it is awaiting an event.

T F 11) The OS may suspend a process if it detects or suspects a problem.

T F 12) All processor designs include a register or set of registers, often known as the program
status word, which contains status information.

T F 13) The process control block is the least important data structure in an OS.

T F 14) A process switch may occur any time that the OS has gained control from the currently
running process.

T F 15) The principal function of the OS is to create, manage, and terminate processes.

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 11:59:10 GMT -05:00

https://www.coursehero.com/file/82565273/Chapter3-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 3

MULTIPLE CHOICE QUESTIONS:

1) The processor itself provides only limited support for multiprogramming, and __________ is needed to
manage the sharing of the processor and other resources by multiple applications at the same time.

A) memory B) data

C) software D) hardware

2) "The process was placed in a suspended state by an agent; either itself, a parent process, or the OS,
for the purpose of preventing its execution," is a characteristic of a _________ process.

A) blocked B) suspended

C) ready D) swapped

3) A __________ is a unit of activity characterized by the execution of a sequence of instructions, a current


state, and an associated set of system resources.

A) identifier B) process

C) state D) kernel

4) We can characterize the behavior of an individual process by listing the sequence of instructions,
referred to as a __________, that executes for that process.

A) state B) trace

C) process block D) priority

5) It is the principal responsibility of the __________ to control the execution of processes.

A) OS B) process control block

C) memory D) dispatcher

6) When one process spawns another, the spawned process is referred to as the __________ .

A) trap process B) child process

C) stack process D) parent process

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 11:59:10 GMT -05:00

https://www.coursehero.com/file/82565273/Chapter3-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 3

7) __________ involves moving part or all of a process from main memory to disk.

A) Swapping B) Relocating

C) Suspending D) Blocking

8) When a process is in the _________ state it is in secondary memory but is available for execution
as soon as it is loaded into main memory.

A) Blocked B) Blocked/Suspend

C) Ready D) Ready/Suspend

9) A process is in the _________ state when it is in main memory and awaiting an event.

A) Blocked B) Blocked/Suspend

C) Ready/Suspend D) Ready

10) The OS must maintain __________ tables to manage processes.

A) process B) I/O

C) memory D) file

11) The collection of program, data, stack, and attributes is referred to as the _________ .

A) process structure B) process control block

C) process location D) process image

12) The _________ is the less-privileged mode.

A) user mode B) kernel mode

C) system mode D) control mode

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 11:59:10 GMT -05:00

https://www.coursehero.com/file/82565273/Chapter3-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 3

13) The __________ contains the basic elements of a user’s program and can be generated
directly from a compiled object file.

A) register context B) user-level context

C) system-level context D) all of the above

14) A total of _________ process states are recognized by the UNIX SVR4 operating system.

A) 3 B) 9

C) 21 D) 15

15) The portion of the operating system that selects the next process to run is called the _________ .

A) trace B) process control block

C) dispatcher D) PSW

SHORT ANSWER QUESTIONS:

1) The __________
os is a layer of software between the applications and the computer hardware
that supports applications and utilities.
Blocked/Suspended
2) A process is in the _________ state when it is in secondary memory and awaiting an event.
program code
3) Two essential elements of a process are __________ and a set of data associated with that code.
file
4) The _________ tables provide information about the existence of files, their location on secondary
memory, their current status, and other attributes.
process control block
5) A significant point about the __________ is that it contains sufficient information so that it is possible
to interrupt a running process and later resume execution as if the interruption had not occurred.
hardware
6) General–purpose registers are _________ dependent.

7) When the OS creates a process at the explicit request of another process, the action is
referred to as __________ . process spawning
round robin
8) The process is said to be operating in a _________ fashion if each process in the queue is given
a certain amount of time, in turn, to execute and then returned to the queue, unless blocked.
Ready
9) A process in the _________ state is in main memory and available for execution.

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 11:59:10 GMT -05:00

https://www.coursehero.com/file/82565273/Chapter3-TextbookBankpdf/
Operating Systems: Internals and Design Principles, 8th Edition Testbank Chapter 3

Memory
10) _________ tables are used to keep track of both main (real) and secondary (virtual) memory.

11) The process control block information can be grouped into three general categories: process
processor state information
identification, __________ and process control information.
Time slice
12) A __________ is the maximum amount of time that a process can execute before being interrupted.
register
13) When a process is not running, the processor status information is stored in the _________ context area.
terminate
14) The principal function of the OS is to create, manage, and ________ processes.
analyzers
15) An IDS comprises three logical components: sensors, __________, and user interface.

This study source was downloaded by 100000856525064 from CourseHero.com on 11-02-2024 11:59:10 GMT -05:00

https://www.coursehero.com/file/82565273/Chapter3-TextbookBankpdf/
Powered by TCPDF (www.tcpdf.org)
1-What is process spawning?
It is the act of creating a new process (Child Process) by an existing
process (Parent Process). This mechanism is used in multitasking
systems to execute tasks concurrently.

2-List four characteristics of a suspended process.


 Not executing
 Resides in secondary storage
 Can be resumed
 Dependent on an external event

3-For what types of entities does the OS maintain tables of


information for management purposes?
 Processes
 Memory
 Files
 Devices
 Users
 Threads
 Resources (e.g., semaphores, mutexes)
4-What are the elements of a process image?
 Program Code (Text Segment)
 Program Counter (PC)
 Process Stack
 Data Section
 Heap
 Process Control Block (PCB)
 File Descriptors
5-What are the steps performed by an OS to create a new
process?
 Assign a Process ID (PID)
 Allocate Memory
 Create Process Control Block (PCB)
 Load Program into Memory
 Set Process State
 Update Process Table
 Assign Resources
 Schedule the Process
6-What is the difference between an interrupt and a trap?
 Interrupt:

 Triggered by hardware events.


 Asynchronous.
 Can be masked or ignored.

 Trap:

 Triggered by software events


 Synchronous.
 Cannot be ignored.

7-Give three examples of an interrupt?


 Timer Interrupt
 Keyboard Interrupt
 Disk I/O Interrupt
8- What is the difference between a User mode and a Kernel mode?

 User Mode:

 Limited access to system resources.


 User applications run in this mode.
 Cannot directly execute privileged instructions.

 Kernel Mode:

 Full access to system resources.


 Operating system runs in this mode.
 Can execute all instructions, including privileged ones.

9- In a fixed partitioning scheme, what are the advantages of


using unequal-size partitions?
1. Better Memory Utilization
2. Reduced Internal Fragmentation
3. Support for Larger Processes

10 What is the difference between internal and external


fragmentation? How we solve each of them?
 Internal Fragmentation:

 Occurs when allocated memory is larger than the requested memory, leaving
unused space within a partition.
 Solution: Use smaller or variable-sized partitions, or use paging.

 External Fragmentation:

 Occurs when free memory is scattered in small blocks, making it difficult to


allocate contiguous memory.
 Solution: Use compaction or paging techniques.
11. list the types of placement Algorithms?
1. First-Fit
2. Best-Fit
3. Worst-Fit
4. Next-Fit
5. Buddy System

12. What is the difference between a page and a frame?


 Page:

 A fixed-size block of logical memory in a virtual memory system.

 Frame:

 A fixed-size block of physical memory in RAM that can hold a page.

13. Identify the advantages and disadvantages of preemptive


scheduling?

Advantages of Preemptive Scheduling:

1. Better responsiveness for interactive tasks.


2. Ensures fair distribution of CPU time.
3. Prevents a single process from monopolizing the CPU.
4. Improves system utilization by quickly switching between processes.

Disadvantages of Preemptive Scheduling:

1. Increased context switching overhead.


2. Potential for more complex synchronization and resource management.
3. Can lead to starvation for low-priority processes.
4. Higher system complexity due to frequent state saving and restoring.
14- Briefly define FCFS scheduling?
FCFS (First-Come, First-Served) Scheduling:

 A non-preemptive algorithm.
 Processes are executed in the order they arrive in the ready queue.
 The first process to arrive is the first to execute.
 The CPU is allocated to processes without interruption until they complete.

15. Briefly define round-robin scheduling?

Round-Robin Scheduling:

 A preemptive algorithm.
 Each process is assigned a fixed time slice (quantum).
 The CPU is allocated in a circular order.
 When a process’s time slice expires, it moves to the back of the queue.
 This continues until all processes are completed.

16. Briefly define shortest job first scheduling?

Shortest Job First (SJF) Scheduling:

 A non-preemptive algorithm.
 The process with the shortest burst time (execution time) is executed first.
 If two processes have the same burst time, they are scheduled in arrival
order.
 Minimizes average waiting time but can lead to "starvation" of longer
processes.
17. What is the difference between preemptive and non-preemptive
scheduling?

Preemptive Scheduling:

 The CPU can be taken from a running process before it completes, allowing
another process to run.
 Provides better responsiveness and fair distribution of CPU time.
 Example: Round-Robin, Preemptive Shortest Job First (SJF).

Non-Preemptive Scheduling:

 Once a process starts execution, it runs to completion or until it voluntarily


gives up the CPU (e.g., via I/O).
 Simpler to implement but can lead to poor responsiveness and inefficient
CPU usage.
 Example: First-Come, First-Served (FCFS), Non-preemptive Shortest Job
First (SJF).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy