Which of these requires citation of sources for work (e.g., writing or code)? Work is copied from another source [1] Work is inspired by another source [2] I copied part of work from a previous submission / publication [3] I am inspired by my previous submission / publication [4]
Blog
Select which of the following operations always require swit…
Select which of the following operations always require switching to Kernel Mode for execution. Handling Interrupts.[1] Opening a web browser.[2] Disk I/O operations.[3] Memory Allocation.[4]
Select True or False for the following statements An access…
Select True or False for the following statements An access control matrix that consists of a large number of groups, and objects will take up more storage space than an access control list of the same number of groups, and objects.[1] A user at security level 2 using the Bell-Lapadula model can only read objects at level 2.[2] In asymmetric secret-key cryptography, the encryption key is always announced publicly.[3]
Which of the following are recognized approaches employed in…
Which of the following are recognized approaches employed in handling deadlocks? I. Ostrich Approach [OA] II. Detection & Recovery [DR] III. Dynamic Avoidance [DA] IV. Deadlock Prevention [DP] V. State Unwinding [SU]
Which of the following statements are correct with respect t…
Which of the following statements are correct with respect to segmentation? I. Total address space can’t exceed the size of physical memory [options] II. There is a single linear address space [options2] III. Procedures and data can be distinguished and separately protected with this scheme [options3] IV. Segmentation is rarely used now. Paging is a more common approach.[options4]
Select True or False for the following statements. A Short…
Select True or False for the following statements. A Short Term Scheduler decides CPU allocation for the processes in interactive Operating Systems.[1] Long Term Schedulers are only used in interactive Operating Systems.[2] The Medium Term Scheduler is responsible for maintaining memory load.[3]
Which of the following are true of chained table allocation…
Which of the following are true of chained table allocation (e.g. FAT file system)? I. Files are allocated in fixed-sized blocks. [BL] II. All parts of the file are stored at contiguous addresses. [CON] III. Chained table allocation (FAT) uses a table to track free disk space.[MA] IV. Uses index block entries to locate data. [IN]
In a modern operating system, if a process wishes to use a d…
In a modern operating system, if a process wishes to use a device: A process can directly access the device to instruct it accordingly without switching to Kernel mode.[1] In passing data to a device, the data from the process is typically first copied to a buffer that can be read by the OS in Kernel mode. [2] Processes access data from a character (serial) device in fixed-sized blocks of bytes.[3] Processes transfer data to a block device as a stream of individual bits, one at a time.[4]
Identify whether each of the following layers belongs to IP,…
Identify whether each of the following layers belongs to IP, OSI, or Both: Network Layer.[1] Access Layer.[2] Presentation Layer.[3] Physical Layer.[4] Application Layer.[5]
Which of the following types of IO is handled by a co-proces…
Which of the following types of IO is handled by a co-processor? Memory-Mapped (MMIO).[1] Port-Mapped (PMIO).[2] Direct Memory Access (DMA).[3] Dedicated Channels.[4]