Select True or False for the following statements An access control matrix that consists of a large number of groups, and objects will take up more storage space than an access control list of the same number of groups, and objects.[1] A user at security level 2 using the Bell-Lapadula model can only read objects at level 2.[2] In asymmetric secret-key cryptography, the encryption key is always announced publicly.[3]
Blog
Which of the following are recognized approaches employed in…
Which of the following are recognized approaches employed in handling deadlocks? I. Ostrich Approach [OA] II. Detection & Recovery [DR] III. Dynamic Avoidance [DA] IV. Deadlock Prevention [DP] V. State Unwinding [SU]
Which of the following statements are correct with respect t…
Which of the following statements are correct with respect to segmentation? I. Total address space can’t exceed the size of physical memory [options] II. There is a single linear address space [options2] III. Procedures and data can be distinguished and separately protected with this scheme [options3] IV. Segmentation is rarely used now. Paging is a more common approach.[options4]
Select True or False for the following statements. A Short…
Select True or False for the following statements. A Short Term Scheduler decides CPU allocation for the processes in interactive Operating Systems.[1] Long Term Schedulers are only used in interactive Operating Systems.[2] The Medium Term Scheduler is responsible for maintaining memory load.[3]
Which of the following are true of chained table allocation…
Which of the following are true of chained table allocation (e.g. FAT file system)? I. Files are allocated in fixed-sized blocks. [BL] II. All parts of the file are stored at contiguous addresses. [CON] III. Chained table allocation (FAT) uses a table to track free disk space.[MA] IV. Uses index block entries to locate data. [IN]
In a modern operating system, if a process wishes to use a d…
In a modern operating system, if a process wishes to use a device: A process can directly access the device to instruct it accordingly without switching to Kernel mode.[1] In passing data to a device, the data from the process is typically first copied to a buffer that can be read by the OS in Kernel mode. [2] Processes access data from a character (serial) device in fixed-sized blocks of bytes.[3] Processes transfer data to a block device as a stream of individual bits, one at a time.[4]
Identify whether each of the following layers belongs to IP,…
Identify whether each of the following layers belongs to IP, OSI, or Both: Network Layer.[1] Access Layer.[2] Presentation Layer.[3] Physical Layer.[4] Application Layer.[5]
Which of the following types of IO is handled by a co-proces…
Which of the following types of IO is handled by a co-processor? Memory-Mapped (MMIO).[1] Port-Mapped (PMIO).[2] Direct Memory Access (DMA).[3] Dedicated Channels.[4]
A researcher is studying whether living near a park affects…
A researcher is studying whether living near a park affects physical activity levels. They collect information about daily step counts from people who live within 1 mile of a park and people who live more than 3 miles from a park. Which statement correctly identifies the components of this observational study?
A consulting firm analyzed the annual revenue growth (%) of…
A consulting firm analyzed the annual revenue growth (%) of 15 small businesses in a metropolitan area. Revenue Growth (%): -12, -8, 4, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 Calculate the mean and median revenue growth. Which statement correctly compares these measures of center?