Operating Systems Concepts Quiz 3 8e

Ace your homework & exams now with Quizwiz!

The capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents is known as ____.

system survivability

It will take a computer ____ to crack a password with a length of three characters if the computer tries one million values per second.

.008788 seconds

A dual-layer, single-sided DVD can hold the equivalent of ____ CDs.

13

RAID level ____ requires two different parity calculations.

6

The formula for computing the current byte address (CBA) for a direct access file with fixed record length is ____.

CBA = (RN - 1) * RL

The ____ is a hardware flag that must be tested by the CPU to determine when a device has completed an operation.

Channel Status Word

____ peripheral devices are assigned to only one job at a time.

Dedicated

____ are special files with listings of filenames and their attributes.

Directories

____ control the transfer of information between the disk drives and the rest of the computer system.

Disk drive interfaces

A field is a group of related records that can be identified by the user with a name, type, and size

False

A firewall typically sits between a network and its individual computers.

False

An optical disc drive spins at a constant speed—this is called constant linear velocity.

False

If a password consists of ten characters, it would take a human about 4.5 years to guess the password if the human makes one try each second.

False

In a file management system, information is passed from the Device Manager at the top of the hierarchy to the File Manager at the bottom.

False

Partial network encryption, also called communications encryption, is the most extreme form of encryption.

False

The File Manager responds to the CREATE command by creating a new file.

False

The IEEE and the Association for Computing Machinery (ACM) issued a standard of ethics for the global computing community in 1977.

False

____ viruses infect data files.

Macro

____ peruse data packets as they pass by, examine each one for specific information, and log copies of interesting packets for more detailed examination.

Packet sniffers

____ is a form of social engineering whereby an intruder pretends to be a legitimate entity and contacts unwary users asking them to reconfirm their personal and/or financial information.

Phishing

____ involve the use of graphics and a pattern of clicks using a touch screen, mouse, or other pointing device.

Picture passwords

____ is a way to optimize search times on hard disk drives by ordering the requests once the read/write heads have been positioned.

Rotational ordering

Intruders have been known to capture user passwords by using a ____ to replace the standard login program on the computer with an identical fake login that captures keystrokes.

Trojan horse

A file extension is usually two to four characters in length and is separated from the relative name by a period.

True

A single computer without access to e-mail or the Internet is easy to protect and has a low risk of attack.

True

A virus is defined as a small program written to alter the way a computer operates, without the permission or knowledge of the user.

True

Blu-ray discs are available in several formats: read-only (BD-ROM), recordable (BD-R), and rewritable (BD-RE).

True

Default passwords pose unique vulnerabilities because they are widely known among system attackers but are a necessary tool for vendors.

True

First-come, first-served (FCFS) is the simplest device-scheduling algorithm: it is easy to program and essentially fair to users.

True

Sequential record organization is by far the easiest to implement because records are stored and retrieved serially, one after the other.

True

What strategy contributes most to system recovery?

data replication

Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity

diagnostic

The USB controller assigns bandwidth to each device depending on its priority. The ____ priority is assigned to real-time exchanges where no interruption in the data flow is allowed, such as video or sound data.

highest

When using indexed sequential record organization, each entry in the index file contains the ____ and the physical location of the data block where this record, and the records with smaller keys, are stored.

highest record key

When data is stored in fixed length fields, data that extends beyond the fixed size ____.

is truncated

One major disadvantage of encryption is that ____.

it increases the system's overhead

An entire system that is backed up once a week and only backs up files daily that are changed on that day is known as a(n) ____ backup.

layered

Each volume in a system has a volume descriptor followed by a ____ that lists the names and characteristics of every file contained in that volume.

master file directory

With the development of ____ technology, a single chip was equipped with two or more processor cores.

multicore

In noncontiguous storage, one way to link file extents is at the storage level where each extent points to the ____.

next extent in the sequence

Using ____, a firewall reviews the header information for incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are all correct.

packet filtering

A ____ server hides important network information from outsiders by making the network server invisible.

proxy

A(n) ____ filename is the name that differentiates a file from other files in the same directory.

relative

A UNIX or Linux system might identify a file as: /usr/imfst/flynn/inventory.doc. The first entry is a forward slash ( / ) representing the master directory, called the ____ directory.

root

The I/O ____ allocates the devices, control units, and channels.

scheduler

Of the three components of access time in a movable-head DASD, ____ is the slowest.

seek time

On magnetic disks, files can be organized in one of three ways: ____.

sequential, direct, or indexed sequential

Although a user directory is treated as a file, it is flagged to indicate to the File Manager that this file is really a ____ whose records are filenames that point to files.

subdirectory

The computer system ____ a file by activating the appropriate secondary storage device and loading the file into memory while updating its records of who is using that file.

allocates

A ____ combines into one program the characteristics of other attacks

blended threat


Related study sets

Prep U Psychiatric-Mental Health Nursing Chapter 13: Trauma and Stressor-Related Disorders

View Set

Lesson 7 Reduction of Risk Potential

View Set

LECOM Medical Interview Questions

View Set

Intermediate Accounting 2 Ch 13-15

View Set

GS MKT 306 CH 16 SOCIAL RESPONSIBILITY AND SUSTAINABILITY

View Set

我今年学十门课 Sentence structures

View Set