Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CS4541 Final | Questions and Answers l

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
16-12-2024
Geschreven in
2024/2025

CS4541 Final | Questions and Answers l

Instelling
Vak

Voorbeeld van de inhoud

CS4541 Final | Questions and Answers


1. For a firewall on a host service to be effective, ALL traffic into and out of the host must pass through the
firewall.: True
2. Which term describes a situation in which the output of execution of con- current processes can change
depending on the order of execution?: race condition
3. Which term means the management of multiple processes on a uniprocesor system?: multiprogramming
4. The type of scheduler that executes most frequently is the -term
scheduler.: short
5. On a uniprocessor, multiprogramming does not enable the inter-leaving of multiple threads within multiple
processes.: False
6. In a Remote Procedure Call, the Send primitive waits until it receives a response before it returns
control to the sending process.: Blocking
7. The ability for a computer to run multiple concurrent paths of execution within a single process is called::
multithreading
8. A thread can run either within a process or ad it's own, separate entity.: False
9. What is the size of the cache represented above in bytes?: 64
10.The possibility that an input can go past the memory allocated for it and overwrite other memory locations
is a vulnerability.: buffer overflow
11.Deadlock limits access to resources and imposes restrictions on processes m.: prevention
12.It is necessary to the activities of various threads so they do not interfere with each
other or corrupt data structures.: synchronize
13.Running instances of an application on multiple cluster nodes with differ- ent sets of inputs for each node is
referred to as computing.: para- metric
14.Would a read or write to physical address 0x0DD5 result in a hit or miss?-
: miss
15.Two kinds of Intrusion Detection Systems are Host-Based IDS and
-Based IDS.: network
16.If there is an application or function that should be implemented as a set of related units of execution, it is
far more efficient to do so as a collection of separate processes rather than a collection of threads.: False
17.The main function of the OS is to present an interface to the user.: False
18.When a process terminates, all threads within that process also terminate.-
: True
19.How many set bits are needed?: 3
20.A resource is one that can be safely used by only one process at a time and is not depleted by that use.:
reusable resource


1/
5

, CS4541 Final | Questions and Answers


21.Which of the following expressions using some combination of the ints above would indicate: Not a
number (NaN)?: exp == 0xFF && frac != 0
22.A process is in the state when it is in secondary memory and awaiting an event.:
Blocked/Suspended
23.Explain the principle of locality (both spacial and local) and explain how it affects cacheing.: Spacial locality
is the idea that a program accessing certain data will access more data which is close in memory to the previous data.
This concept affects cacheing because data which is cached will also have data which is nearby in memory cached along
with it. Temporal locality is the idea that a program accessing certain data will access that data again in the near future.
This concept affects cacheing because recently accessed data from memory is stored in the cache to be accessed more
easily again in the future.
24.Bob is an employee of a company and has some user level access to s server. He figures out how to get
administrative privileges to look at data that he's not supposed to have access to, and when he does so he
eliminates log entries that would allow someone else to figure out what he's done. List the appropriate terms that
would apply to what kind of intruder Bob is. Justify your classifications.: Bob is a Misfeasor. Bob is a legitimate
employee at his company, but finds a way to get access to data which he is not authorized to view, making Bob a
Misfeafor. The way in which Bob gained access to this data may have been through social engineering one of his
coworkers/supervisors.
25.An attacker who compromises a legitimate user's account and pretends to be that user is referred to as a::
masquerader
26.Which kind of task (on a real-time system) has a deadline that MUST be met?: hard task
27.A process that spawns another is called the:: parent process
28.What kind of semaphore doesn't specify the order in which each process is removed from the queue?: None
of these
29.Deadlock is possible when hold-and-wait,
, and no-preemption are present.: mutual exclusion
30.Program code and associated data are two necessary elements of a
.: Process
31.Which scheduling policy is non-preemptive?: SPN
32.User control is very restricted in a real-time operating system compared to on an ordinary system.: False
33.Which of the following is shared by all threads within a process?: user address space
34.FCFS tends to work better for short processes than for longer ones.: False




2/
5

Geschreven voor

Vak

Documentinformatie

Geüpload op
16 december 2024
Aantal pagina's
5
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$8.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
smartchoices Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
36
Lid sinds
5 jaar
Aantal volgers
5
Documenten
4499
Laatst verkocht
3 weken geleden

4.8

9 beoordelingen

5
7
4
2
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen