COP 4610 Exam 3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In the Linux scheduler, processes with the SCHED_OTHER type have the highest priority.

False

One disadvantage of Windows is that it does not provide much support for users working in non-English languages.

False

The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community in 1977.

False

The UNIX I/O system is divided into the block I/O system and the interactive I/O system.

False

Any vulnerability at the operating system level opens the entire system to attack.

True

Before the 1995 release of the Windows 95 operating system, all Windows products were merely graphical user interfaces that required the MS-DOS operating system to perform tasks.

True

IBM and Hewlett-Packard were among the companies that established The Open Group, which still owns the trademark to the name UNIX.

True

One of the biggest concerns about Windows operating systems is the need for aggressive patch management to combat the many viruses and worms that target these systems.

True

The I/O Manager allows device drivers and file systems, which it perceives as device drivers, to be loaded dynamically based on the needs of the user.

True

The name Linux is a contraction of Linus and UNIX.

True

Virtual memory is implemented in Linux through demand paging.

True

The command ____ is used to find a specified string of characters in a file in Linux.

grep

Because Linux is written and distributed under the ____ General Public License, its source code is freely distributed and available to the general public.

GNU

In UNIX, swapping uses a round robin memory-management policy.

True

In public/private key encryption, the private key is a pair of two prime numbers chosen by the person who wants to receive a private message.

True

Linux has system calls that change the size of the process data segment, either by expanding it to accommodate extra data values or reducing it when certain values positioned at the end of the data segment are no longer needed.

True

Trash collection, also known as ____, is an evening pastime for those who enjoy perusing anything and everything thrown out by system users.

dumpster diving

The immediate result of a worm is ____.

the slower processing time of legitimate work

All Linux files are organized in directories that are connected to each other in a tree-like structure.

True

A continuing series of security awareness and ethics communications to computer users is more effective than a single announcement.

True

A replacement paging policy determines which virtual page must be removed from memory to make room for a new page.

True

Effective distributed security requires an authentication mechanism that allows a server to prove its identity to a client.

False

The UNIX kernel does not reside in memory permanently; that is, it can be swapped out when needed to provide more space for applications.

False

The UNIX process scheduling algorithm picks the process that will run in the shortest amount of time to be run first.

False

By default, a Windows process contains one thread with four components: a unique identifier, the contents of a volatile set of registers indicating state, two stacks used in the thread's execution, and a private storage area used by subsystems and libraries. These components are called the thread's ____.

context


Ensembles d'études connexes

3. أخلاقيات الأعمال

View Set

Biology: DNA Replication, Cell Cycle and Mitosis

View Set

Radians to Degrees and Degrees to Radians

View Set