Listed below are general rules that help establish a suitable testing environment for the test taker and for the proctor. Testing environment: A desk area that is free of papers and clutter. Uniform lighting and avoidance of strong lighting (electric light or sunlit window) in the direction the camera is pointing. Test Taker No headphones or ear plugs. No cell phones, tablets, or unauthorized materials (blank scratch paper is OK) No head gear or hair that obscures the eyes. No sound from radio or TV during the exam. No other persons in the room. Question: Which of the following situations provides the best testing environment for both the test taker and the proctor?
Blog
I will be able to wait until the last day or two before a pr…
I will be able to wait until the last day or two before a project is due to crank it out.
When I feel that there is an error in grading, I should…
When I feel that there is an error in grading, I should…
Which of the following types of assignments are to be done i…
Which of the following types of assignments are to be done in groups? Mark all that apply.
Which of the following would result from doubling the block…
Which of the following would result from doubling the block size in a multilevel indexed filesystem, assuming no other changes? Doubling of maximum file size.[1] Decrease the average read/write time on spinning disks.[2] Increased space efficiency / utilization.[3] Doubling of maximum filesystem size.[4]
Which of these requires citation of sources for work (e.g.,…
Which of these requires citation of sources for work (e.g., writing or code)? Work is copied from another source [1] Work is inspired by another source [2] I copied part of work from a previous submission / publication [3] I am inspired by my previous submission / publication [4]
Select which of the following operations always require swit…
Select which of the following operations always require switching to Kernel Mode for execution. Handling Interrupts.[1] Opening a web browser.[2] Disk I/O operations.[3] Memory Allocation.[4]
Select True or False for the following statements An access…
Select True or False for the following statements An access control matrix that consists of a large number of groups, and objects will take up more storage space than an access control list of the same number of groups, and objects.[1] A user at security level 2 using the Bell-Lapadula model can only read objects at level 2.[2] In asymmetric secret-key cryptography, the encryption key is always announced publicly.[3]
Which of the following are recognized approaches employed in…
Which of the following are recognized approaches employed in handling deadlocks? I. Ostrich Approach [OA] II. Detection & Recovery [DR] III. Dynamic Avoidance [DA] IV. Deadlock Prevention [DP] V. State Unwinding [SU]
Which of the following statements are correct with respect t…
Which of the following statements are correct with respect to segmentation? I. Total address space can’t exceed the size of physical memory [options] II. There is a single linear address space [options2] III. Procedures and data can be distinguished and separately protected with this scheme [options3] IV. Segmentation is rarely used now. Paging is a more common approach.[options4]