Final COP4610
Which of the following is (a)/are key property/properties of survivable systems?
recovery of essential services after an attack
The device capable of identifying the right link to forward packetized data on the internet is known as a ______ .
router
____ is the time required to position the read/write head on the proper track.
seek time
The SSTF scheduling algorithm ____.
services the request with the minimum seek time
The most appropriate keywords that define networks are _____ and _____ .
sharing, communication
Random access is ____ magnetic tape storage.
slower than HDDs in
The earliest examples of wireless signals among the options is _____ .
smoke signals
A(n) ____ file is a sequence of subroutines and functions
source
A ___ is a private network connecting servers and high speed hard disk and tape units.
storage-area network
A local area network (LAN) is defined by _______________.
the geographic size of the network
A mount point is _____.
the location within the file structure where the file system is to be attached
In an environment where several processes may open the same file at the same time, ____.
the operating system typically uses two internal tables called the system-wide and per-process tables to keep track of open files
The Operating System is trying to transfer a 6KB block of data from an HDD to the memory if the HDD spins at 5400 RPM? The delay involved in moving the R/W head assembly to the right track is 12 milliseconds on an average. The host and disk controllers need a negotiating time of 0.7 millisecond.The maximum theoretical per second transfer capability of the disk is 800 Mb of data. What would be the data transfer time (time ONLY for data transfer) for the 6KB block in milliseconds correct to three digits after the decimal point? (write only the number)
.059
The Operating System is trying to transfer a block of size 8KB on a 7200 rpm SATA hard disk that can realistically transfer data at a rate of 0.5 Gbps. The disk is known to have an average seek time of 3.1ms and its controller needs a small overhead of 0.4 ms when initiating a data transfer. What would be the data transfer time (time ONLY for data transfer) for the 8KB block in milliseconds correct to two digits after the decimal point? (write only the number)
.12
What is the maximum bandwidth of a typical wired LAN today?
10 Gbps
IP version 6 provides for ____ bits of address for any node.
128
The Operating System is trying to transfer a 6KB block of data from an HDD to the memory if the HDD spins at 5400 RPM? The delay involved in moving the R/W head assembly to the right track is 12 milliseconds on an average. The host and disk controllers need a negotiating time of 0.7 millisecond.The maximum theoretical per second transfer capability of the disk is 800 Mb of data. What would be the average I/O time required in milliseconds correct to one digit after the decimal point? (write only the number)
18.2
On a traditional magnetic hard disk drive with 200 cylinders (numbered 0 - 199), a file transfer requires access to the cylinders in the following fashion: 116, 22, 3, 11, 75, 185, 11, 87Draw the head travel sequence in the order of cylinders covered for FCFS, SSTF, SCAN, C-SCAN, LOOK and C-LOOK algorithms in order to answer the below questions. Assume that the head is over cylinder 88 at the start, and is moving upward through the cylinders towards the last cylinder 199? The head assembly flyback time is 20 cylinders. What is the total cylinder travel for C-LOOK algorithm? (write only the number)
201
On a traditional magnetic hard disk drive with 200 cylinders (numbered 0 - 199), a file transfer requires access to the cylinders in the following fashion: 116, 22, 3, 11, 75, 185, 11, 87Draw the head travel sequence in the order of cylinders covered for FCFS, SSTF, SCAN, C-SCAN, LOOK and C-LOOK algorithms in order to answer the below questions. Assume that the head is over cylinder 88 at the start, and is moving upward through the cylinders towards the last cylinder 199? The head assembly flyback time is 20 cylinders. What is the total cylinder travel for C-SCAN algorithm? (write only the number)
218
On a traditional magnetic hard disk drive with 200 cylinders (numbered 0 - 199), a file transfer requires access to the cylinders in the following fashion: 116, 22, 3, 11, 75, 185, 11, 87Draw the head travel sequence in the order of cylinders covered for FCFS, SSTF, SCAN, C-SCAN, LOOK and C-LOOK algorithms in order to answer the below questions. Assume that the head is over cylinder 88 at the start, and is moving upward through the cylinders towards the last cylinder 199? The head assembly flyback time is 20 cylinders. What is the total cylinder travel for LOOK algorithm? (write only the number)
279
On a traditional magnetic hard disk drive with 200 cylinders (numbered 0 - 199), a file transfer requires access to the cylinders in the following fashion: 116, 22, 3, 11, 75, 185, 11, 87Draw the head travel sequence in the order of cylinders covered for FCFS, SSTF, SCAN, C-SCAN, LOOK and C-LOOK algorithms in order to answer the below questions. Assume that the head is over cylinder 88 at the start, and is moving upward through the cylinders towards the last cylinder 199? The head assembly flyback time is 20 cylinders. What is the total cylinder travel for SSTF algorithm? (write only the number)
305
On a traditional magnetic hard disk drive with 200 cylinders (numbered 0 - 199), a file transfer requires access to the cylinders in the following fashion: 116, 22, 3, 11, 75, 185, 11, 87Draw the head travel sequence in the order of cylinders covered for FCFS, SSTF, SCAN, C-SCAN, LOOK and C-LOOK algorithms in order to answer the below questions. Assume that the head is over cylinder 88 at the start, and is moving upward through the cylinders towards the last cylinder 199? The head assembly flyback time is 20 cylinders. What is the total cylinder travel for SCAN algorithm? (write only the number)
307
The Operating System is trying to transfer a block of size 8KB on a 7200 rpm SATA hard disk that can realistically transfer data at a rate of 0.5 Gbps. The disk is known to have an average seek time of 3.1ms and its controller needs a small overhead of 0.4 ms when initiating a data transfer. What would be the average latency of this disk in milliseconds correct to two digits after the decimal point? (write only the number)
4.17
The Operating System is trying to transfer a 6KB block of data from an HDD to the memory if the HDD spins at 5400 RPM? The delay involved in movingthe R/W head assembly to the right track is 12 milliseconds on an average. The host and disk controllers need a negotiating time of 0.7 millisecond.The maximum theoretical per second transfer capability of the disk is 800 Mb of data. What would be the average latency of this disk in milliseconds correct to two digits after the decimal point? (write only the number)
5.55
On a traditional magnetic hard disk drive with 200 cylinders (numbered 0 - 199), a file transfer requires access to the cylinders in the following fashion: 116, 22, 3, 11, 75, 185, 11, 87Draw the head travel sequence in the order of cylinders covered for FCFS, SSTF, SCAN, C-SCAN, LOOK and C-LOOK algorithms in order to answer the below questions. Assume that the head is over cylinder 88 at the start, and is moving upward through the cylinders towards the last cylinder 199? The head assembly flyback time is 20 cylinders. What is the total cylinder travel for FCFS algorithm? (write only the number)
573
RAID Level ____ requires that two disks be dedicated to parity strips and not data.
6
The Operating System is trying to transfer a block of size 8KB on a 7200 rpm SATA hard disk that can realistically transfer data at a rate of 0.5 Gbps. The disk is known to have an average seek time of 3.1ms and its controller needs a small overhead of 0.4 ms when initiating a data transfer. What would be the average I/O time required in milliseconds correct to two digits after the decimal point? (write only the number)
7.79
Which of the following is not a tecnique of error detection and correction in data storage and transfer?
ASCII Codes
Which of the below is not a deciding factor in the choice of network topology?
Address resolution
Hybrid network topologies can be created by connecting diverse topologies with the help of ______
Bridges
________ is/are not considered a difficulty when considering file sharing.
Reliability
Which of the following is not a routing protocol?
SMTP
Which of these is not a technique used in RAID?
Thrashing
WiMAX is ______ .
a wireless technology with a rough radius in 10's of miles
Buffering is done ___ .
all options correct
Backups can help after
all the options
The path name /home/people/os-student/chap10.txt is an example of
an absolute path name
Kerberos is _____ .
an authentication software
In the TCP/IP protocol suite, the physical layer is concerned with the movement of _______ over the physical medium.
bits
Which of the below is not a reason behind networking?
cache utilization
A system in which a process with lesser responsibility requests another process with higher capability to get something done is known as ______ .
client-server networking
Which of the below is not a basic file operation?
concatenating a file to another
The ____ register of an I/O port can be written by the host to start a command or to change the mode of a device.
control
A goal of all networked systems is to provide a convenient way to share resources while ______ users' access to them.
controlling
In the TCP/IP protocol suite, the ______ layer is responsible for moving frames from one hop (node) to the next.
data link
Off-site backups would not be useful after
denial of service attack
A(n) ____ file is a series of code sections that the loader can bring into memory and run.
executable
A firewall is _____ .
hardware and/or software
Which of the following is not an essential element of system management?
hardware recycling
A(n) ____ file is a sequence of bytes organized into blocks understandable by the system's linker.
object
The re-recordable CD-RW and DVD-RW are examples of ____ disks.
phase-change
Collection of loosely coupled ______ can be called a network.
processors
A/n _____ is a set of rules describing the steps, format, and content of messages exchanged between two hosts.
protocol
The world wide web is _____ .
a part of the Internet
A ______ is a central controller used for implementing a network topology based on broadcast.
Hub
The ______ provides the identification of a node in the network.
IP address
The Mbps units expand to _____ .
Mega bits per second
When networking capability is added to single-user operating system and users are aware of network resources, the implementation uses ____ .
network operating systems
The concept that enables household devices such as refrigerators, TVs, light switches and security cameras to be accessible from anywhere in the world is known as ____ .
Internet of things
Which of the following is true of the direct-access method?
It allows programs to read and write records in no particular order.
Which of the below factors does not influence the choice of a network topology?
Operating System
A network used to transfer data from a fitness device to a phone using Bluetooth as the protocol is an example of a ______ .
PAN
Eavesdropping is an example of what kind of attack?
Passive attack
Martha receives an e-mail message containing a notice that appears to be from her bank, asking her to call and update her password. Which type of attack is this?
Phishing
A network is a collection of loosely coupled processors interconnected by communication links using cables. This statement is
True
A self-executing, self-replicating program written to alter the way a computer operates and is run without the permission or knowledge of the user is termed a(n) ____.
Virus
Which of the below resources cannot be shared between two separate hosts on a network?
a CPU register
A wireless access point is connected to the wired network using ______ .
a LAN cable
In a HDD, a cylinder is
a collection of a specific track on all surfaces
A RAID structure ____.
is primarily used to ensure higher data reliability
____ is the time it takes to rotate the disk until the requested record is moved under the read/write head.
latency
If a system manager is performing back up the entire system once a week, and only back up, daily, the files that were changed that day, s/he is following a(n) ____ .
layered backup plan
A network in which every node has a direct link to every other node in the network is known as a ____ .
mesh network
Networks cannot provide an essential infrastructure for the members of an information-based society to
mine data
When information is sent from one to many, but not all, it is known as a ____ .
multicast
Path for network content can be selected through the following method/s
virtual circuits