final practice

¡Supera tus tareas y exámenes ahora con Quizwiz!

root

A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory.

proxy

A ____ server hides important network information from outsiders by making the network server invisible.

hamming code

A ____, used in RAID Level 2, is a coding scheme that adds extra, redundant bits to the data and is therefore able to correct single-bit errors and detect double-bit errors.

true

A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.

as more jobs enter, there can be an increase in page faults

A danger of positive feedback loops is that ____.

become part of the system and can distort analysis results

A disadvantage of software monitoring tools is that they ____.

absolute

A file's ____ filename includes all path information for that file.

true

A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.

access control list

A(n) ____ contains a list of files, each of which is associated with the names of users who are allowed to access it and the type of access each user is permitted.

relative

A(n) ____ filename is the name that differentiates a file from other files in the same directory.

domains

Active Directory groups machines into administrative units called ____.

subdirectory

Although a user directory is treated as a file, it is flagged to indicate to the File Manager that this file is really a ____ whose records are filenames that point to files.

true

An algorithm for a positive feedback loop should monitor the effect of new arrivals in two places: the Processor Manager's control of the CPU and the Device Manager's read and write operations.

layered

An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup.

working

As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.

false

Benchmark results are valuable because they are not dependent upon system workload, system design and implementation, or the specific requirements of the applications loaded on the system.

true

Benchmarks are often used by vendors to demonstrate to prospective clients the specific advantages of a new CPU, operating system, compiler, or piece of hardware.

false

Blocking I/O requests to optimize access times increases the number of physical I/O requests.

context

By default, a Windows process contains one thread with four components: a unique identifier, the contents of a volatile set of registers indicating state, two stacks used in the thread's execution, and a private storage area used by subsystems and libraries. These components are called the thread's ____.

master file directory

Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume.

master-file directory

Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume.

unintentional attack

Errors can occur when data values are incorrectly stored because the field isn't large enough to hold the numeric value stored there. This issue is an example of a(n) ____

diagnostic

Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity.

false

Historically, most commercial operating systems were designed to be general purpose, i.e., to not favor any specific use or computing environment.

1.25 minutes

If 2.5 minutes is the maximum access time for a magnetic tape, ____ is the average access time.

false

If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.

boot.log

In Linux, the ____ log file stores messages of which systems have successfully started up and shut down, as well as any that have failed to do so.

owner, group, others

In Linux, the three levels of file access are ____, ____, and ____.

buddy algorithm

In Linux, up to a total of 256MB of usable memory can be configured into equal-sized page frames, which can be grouped to give more contiguous space to a job. These groups can also be split to accommodate smaller jobs. The process of grouping and splitting usable memory is known as the ____.

hashing

In a direct record organization scheme, the program used to store the data follows a set of instructions, called a ____ algorithm, that transforms each key into a number, the record's logical address.

105 ms

In a system containing CPU 1 and Disk Drive A, the system is instructed to access Track 1, Track 9, Track 1, and then Track 9 of Drive A. The arm is initially located at Track 1. Drive A requires 35 ms for each move. Without reordering, Drive A requires ____ to complete the access.

null

In indexed storage, when a file is created, the pointers in the index block are all set to ____.

trojan horse

Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

false

LDAP is the hierarchical replicated naming service on which the Internet is built.

wait

Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.

three

Linux provides semaphores to help solve the problems of mutual exclusion and of producers and consumers. The Linux semaphore structure contains ____ fields.

six

Linux updates are issued free to the public about every ____ months.

true

Nested RAID levels, also called hybrid levels, are complex RAID configurations created by combining multiple standard levels.

seek time

Of the three components of access time in a movable-head DASD, ____ is the slowest.

sequential, direct, indexed sequential

On magnetic disks, files can be organized in one of three ways: ____.

6

RAID level ____ requires two different parity calculations.

true

Resource availability in its simplest form means that a unit will be operational and not out of service when a user needs it.

false

Resource utilization is usually measured as the percentage of time that the resource is idle.

false

Some viruses are considered to be benign.

true

The I/O Manager allows device drivers and file systems, which it perceives as device drivers, to be loaded dynamically based on the needs of the user.

scheduler

The I/O ____ allocates the devices, control units, and channels.

true

The Network Manager allows a network administrator to monitor the use of individual computers and shared hardware, and ensures compliance with software license agreements.

highest

The USB controller assigns bandwidth to each device depending on its priority. The ____ priority is assigned to real-time exchanges where no interruption in the data flow is allowed, such as video or sound data.

Ctrl, Alt, and Delete

The Windows Task Manager can be opened by pressing and holding the ____ keys together.

I/O Manager

The ____ creates a driver object when a driver is loaded into the system and then calls the driver's initialization routine.

channel status word

The ____ is a hardware flag that must be tested by the CPU to determine when a device has completed an operation.

fetch

The ____ paging policy determines when the pager copies a page from disk to memory.

System Survivability

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.

allocates

The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file.

megabytes

The data-transfer rate for an optical disc is measured in ____ per second and refers to the speed at which massive amounts of data can be read from the disc.

indicates whether to delete the file after closing it

The file disposition attribute ____.

MTBF / (MTBF + MTTR)

The formula used to calculate a unit's availability is ____.

slower processing time of legitimate work

The immediate result of a worm is ____.

false

The location of a volume's directory on the disk does not make a difference in the time it takes to access it.

density

The number of characters that can be recorded per inch on a magnetic tape is determined by the ____ of the tape.

depends upon the organization

The overall responsibility of keeping an organization's software up to date ____.

character devices, block devices, and network devices

The three standard classes of devices supported by Linux are ____.

extensibility, portability, reliability, compatibility, and performance

To accommodate the various needs of its user community, and to optimize resources, the Windows team identified the following design goals:____.

true

To ensure the integrity of the Windows operating system code, the designers separated operating system functions into a privileged executive process and a set of nonprivileged processes called protected subsystems.

lands

To put data on an optical disc requires a high-intensity laser beam, which burns indentations, called pits, and flat areas, called ____.

transport speed

Transfer rate of a magnetic tape is measured in inches per second (ips) using the following formula: transfer rate = density * ____.

create a new directory or subdirectory

Typing MD from the Command Prompt screen will ____.

android

Virtual memory in Linux is managed using a multiple-level table hierarchy. Linux provides the foundation for the ____ operating system.

layered with internet

What configuration has the highest level of risk?

is truncated

When data is stored in fixed length fields, data that extends beyond the fixed size ____.

network manager

When networked devices, such as printers, plotters, or disk drives are required, the ____ has the responsibility of allocating and deallocating the required resources correctly.

virtual

When physical memory becomes full, the ____ Memory Manager pages some of the memory contents to disk, freeing physical memory for other processes.

ubuntu

Which of the following is a popular distribution of Linux?

false

Windows XP was the last Windows operating system built on the Windows 95 kernel.

Memory-mapped

____ files exploit virtual memory capabilities by allowing an application to open a file of arbitrary size and treat it as a single contiguous array of memory locations without buffering data or performing disk I/O.

phishing

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

Rotational Ordering

____ is a way to optimize search times on hard disk drives by ordering the requests once the read/write heads have been positioned.

Reliability

____ is similar to availability but it measures the probability that a unit will not fail during a given time period.

reliability

____ is similar to availability but it measures the probability that a unit will not fail during a given time period.

throughput

____ is/are usually measured under steady-state conditions and will reflect quantities such as "the number of jobs processed per day" or "the number of online transactions handled per hour."

packet sniffer

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination.

front-end

____ text compression builds on the previous data element. The first data element in a list is not compressed but each entry after that takes a given number of characters from the previous entry that they have in common and then adds the characters that make it unique.

SSTF

____ uses the same underlying philosophy as shortest job next, where the shortest jobs are processed first and longer jobs are made to wait.

false

A driver object can only have one device connected to it.

false

A firewall typically sits between a network and its individual computers.

false

A gap in system security in always indicative of malicious activity.

slow down process arrival rate

A negative feedback loop mechanism monitors the system and, when it becomes too congested, signals the Job Scheduler to ____.

true

A replacement paging policy determines which virtual page must be removed from memory to make room for a new page.

false

An optical disc drive spins at a constant speed—this is called constant linear velocity.

agent-based and agentless

Deployment software falls into two groups: ____ software.

overhead

One major disadvantage of encryption is that there is a lot of ____.

fixed

When a process begins execution, its segments have a ____ size.

Resource allocation

____ is a measure of how much each resource is contributing to the overall operation of the system.

Seek

____ time is the time required to move the arm of a movable-head magnetic drive into position over the proper track.


Conjuntos de estudio relacionados

Industrialization and Gilded Age A3 Honors US History Vocab

View Set

BUS 271 - Unite One Practice Test

View Set

Mental Health: Physiological & Psychological Responses to Stress

View Set

Chapt. 12: Cognitive Interventions in Psychiatric Nursing

View Set

Wong's 10th Ed Chapter 27: The Child with Cerebral Dysfunction

View Set

CH 04 READING QUIZ - LOUIS ARMSTRONG AND THE FIRST GREAT SOLOISTS

View Set

Chemistry Review over Covalent Bonding

View Set

PHYL141 C13 Cranial Nerves, Peripheral Nervous System & General Senses

View Set

Corporate Finance Chapter 1-3 Study Guide

View Set

exam 1 2036 test multiple choice questions??

View Set

Ch. 7 Membrane Structure and Function Dynamic Study Module

View Set