CS4541 Final | Questions and Answers
1. For a firewall on a host service to be effective, ALL traffic into and out of the host must pass through the
firewall.: True
2. Which term describes a situation in which the output of execution of con- current processes can change
depending on the order of execution?: race condition
3. Which term means the management of multiple processes on a uniprocesor system?: multiprogramming
4. The type of scheduler that executes most frequently is the -term
scheduler.: short
5. On a uniprocessor, multiprogramming does not enable the inter-leaving of multiple threads within multiple
processes.: False
6. In a Remote Procedure Call, the Send primitive waits until it receives a response before it returns
control to the sending process.: Blocking
7. The ability for a computer to run multiple concurrent paths of execution within a single process is called::
multithreading
8. A thread can run either within a process or ad it's own, separate entity.: False
9. What is the size of the cache represented above in bytes?: 64
10.The possibility that an input can go past the memory allocated for it and overwrite other memory locations
is a vulnerability.: buffer overflow
11.Deadlock limits access to resources and imposes restrictions on processes m.: prevention
12.It is necessary to the activities of various threads so they do not interfere with each
other or corrupt data structures.: synchronize
13.Running instances of an application on multiple cluster nodes with differ- ent sets of inputs for each node is
referred to as computing.: para- metric
14.Would a read or write to physical address 0x0DD5 result in a hit or miss?-
: miss
15.Two kinds of Intrusion Detection Systems are Host-Based IDS and
-Based IDS.: network
16.If there is an application or function that should be implemented as a set of related units of execution, it is
far more efficient to do so as a collection of separate processes rather than a collection of threads.: False
17.The main function of the OS is to present an interface to the user.: False
18.When a process terminates, all threads within that process also terminate.-
: True
19.How many set bits are needed?: 3
20.A resource is one that can be safely used by only one process at a time and is not depleted by that use.:
reusable resource
1/
5
, CS4541 Final | Questions and Answers
21.Which of the following expressions using some combination of the ints above would indicate: Not a
number (NaN)?: exp == 0xFF && frac != 0
22.A process is in the state when it is in secondary memory and awaiting an event.:
Blocked/Suspended
23.Explain the principle of locality (both spacial and local) and explain how it affects cacheing.: Spacial locality
is the idea that a program accessing certain data will access more data which is close in memory to the previous data.
This concept affects cacheing because data which is cached will also have data which is nearby in memory cached along
with it. Temporal locality is the idea that a program accessing certain data will access that data again in the near future.
This concept affects cacheing because recently accessed data from memory is stored in the cache to be accessed more
easily again in the future.
24.Bob is an employee of a company and has some user level access to s server. He figures out how to get
administrative privileges to look at data that he's not supposed to have access to, and when he does so he
eliminates log entries that would allow someone else to figure out what he's done. List the appropriate terms that
would apply to what kind of intruder Bob is. Justify your classifications.: Bob is a Misfeasor. Bob is a legitimate
employee at his company, but finds a way to get access to data which he is not authorized to view, making Bob a
Misfeafor. The way in which Bob gained access to this data may have been through social engineering one of his
coworkers/supervisors.
25.An attacker who compromises a legitimate user's account and pretends to be that user is referred to as a::
masquerader
26.Which kind of task (on a real-time system) has a deadline that MUST be met?: hard task
27.A process that spawns another is called the:: parent process
28.What kind of semaphore doesn't specify the order in which each process is removed from the queue?: None
of these
29.Deadlock is possible when hold-and-wait,
, and no-preemption are present.: mutual exclusion
30.Program code and associated data are two necessary elements of a
.: Process
31.Which scheduling policy is non-preemptive?: SPN
32.User control is very restricted in a real-time operating system compared to on an ordinary system.: False
33.Which of the following is shared by all threads within a process?: user address space
34.FCFS tends to work better for short processes than for longer ones.: False
2/
5
1. For a firewall on a host service to be effective, ALL traffic into and out of the host must pass through the
firewall.: True
2. Which term describes a situation in which the output of execution of con- current processes can change
depending on the order of execution?: race condition
3. Which term means the management of multiple processes on a uniprocesor system?: multiprogramming
4. The type of scheduler that executes most frequently is the -term
scheduler.: short
5. On a uniprocessor, multiprogramming does not enable the inter-leaving of multiple threads within multiple
processes.: False
6. In a Remote Procedure Call, the Send primitive waits until it receives a response before it returns
control to the sending process.: Blocking
7. The ability for a computer to run multiple concurrent paths of execution within a single process is called::
multithreading
8. A thread can run either within a process or ad it's own, separate entity.: False
9. What is the size of the cache represented above in bytes?: 64
10.The possibility that an input can go past the memory allocated for it and overwrite other memory locations
is a vulnerability.: buffer overflow
11.Deadlock limits access to resources and imposes restrictions on processes m.: prevention
12.It is necessary to the activities of various threads so they do not interfere with each
other or corrupt data structures.: synchronize
13.Running instances of an application on multiple cluster nodes with differ- ent sets of inputs for each node is
referred to as computing.: para- metric
14.Would a read or write to physical address 0x0DD5 result in a hit or miss?-
: miss
15.Two kinds of Intrusion Detection Systems are Host-Based IDS and
-Based IDS.: network
16.If there is an application or function that should be implemented as a set of related units of execution, it is
far more efficient to do so as a collection of separate processes rather than a collection of threads.: False
17.The main function of the OS is to present an interface to the user.: False
18.When a process terminates, all threads within that process also terminate.-
: True
19.How many set bits are needed?: 3
20.A resource is one that can be safely used by only one process at a time and is not depleted by that use.:
reusable resource
1/
5
, CS4541 Final | Questions and Answers
21.Which of the following expressions using some combination of the ints above would indicate: Not a
number (NaN)?: exp == 0xFF && frac != 0
22.A process is in the state when it is in secondary memory and awaiting an event.:
Blocked/Suspended
23.Explain the principle of locality (both spacial and local) and explain how it affects cacheing.: Spacial locality
is the idea that a program accessing certain data will access more data which is close in memory to the previous data.
This concept affects cacheing because data which is cached will also have data which is nearby in memory cached along
with it. Temporal locality is the idea that a program accessing certain data will access that data again in the near future.
This concept affects cacheing because recently accessed data from memory is stored in the cache to be accessed more
easily again in the future.
24.Bob is an employee of a company and has some user level access to s server. He figures out how to get
administrative privileges to look at data that he's not supposed to have access to, and when he does so he
eliminates log entries that would allow someone else to figure out what he's done. List the appropriate terms that
would apply to what kind of intruder Bob is. Justify your classifications.: Bob is a Misfeasor. Bob is a legitimate
employee at his company, but finds a way to get access to data which he is not authorized to view, making Bob a
Misfeafor. The way in which Bob gained access to this data may have been through social engineering one of his
coworkers/supervisors.
25.An attacker who compromises a legitimate user's account and pretends to be that user is referred to as a::
masquerader
26.Which kind of task (on a real-time system) has a deadline that MUST be met?: hard task
27.A process that spawns another is called the:: parent process
28.What kind of semaphore doesn't specify the order in which each process is removed from the queue?: None
of these
29.Deadlock is possible when hold-and-wait,
, and no-preemption are present.: mutual exclusion
30.Program code and associated data are two necessary elements of a
.: Process
31.Which scheduling policy is non-preemptive?: SPN
32.User control is very restricted in a real-time operating system compared to on an ordinary system.: False
33.Which of the following is shared by all threads within a process?: user address space
34.FCFS tends to work better for short processes than for longer ones.: False
2/
5