COP 4610 Exam 3
In the Linux scheduler, processes with the SCHED_OTHER type have the highest priority.
False
One disadvantage of Windows is that it does not provide much support for users working in non-English languages.
False
The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community in 1977.
False
The UNIX I/O system is divided into the block I/O system and the interactive I/O system.
False
Any vulnerability at the operating system level opens the entire system to attack.
True
Before the 1995 release of the Windows 95 operating system, all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks.
True
IBM and Hewlett-Packard were among the companies that established The Open Group, which still owns the trademark to the name UNIX.
True
One of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems.
True
The I/O Manager allows device drivers and file systems, which it perceives as device drivers, to be loaded dynamically based on the needs of the user.
True
The name Linux is a contraction of Linus and UNIX.
True
Virtual memory is implemented in Linux through demand paging.
True
The command ____ is used to find a specified string of characters in a file in Linux.
grep
Because Linux is written and distributed under the ____ General Public License, its source code is freely distributed and available to the general public.
GNU
In UNIX, swapping uses a round robin memory-management policy.
True
In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.
True
Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.
True
Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.
dumpster diving
The immediate result of a worm is ____.
the slower processing time of legitimate work
All Linux files are organized in directories that are connected to each other in a tree-like structure.
True
A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.
True
A replacement paging policy determines which virtual page must be removed from memory to make room for a new page.
True
Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.
False
The UNIX kernel does not reside in memory permanently; that is, it can be swapped out when needed to provide more space for applications.
False
The UNIX process scheduling algorithm picks the process that will run in the shortest amount of time to be run first.
False
By default, a Windows process contains one thread with four components: a unique identifier, the contents of a volatile set of registers indicating state, two stacks used in the thread's execution, and a private storage area used by subsystems and libraries. These components are called the thread's ____.
context
