Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

SS

QuestionAnswer
The logical address is generated by the CPU
Memory Management Unit (MMU) is a hardware device that at run time maps virtual to physical address
Virtual Memory is separation of user logical memory from physical memory
Copy-on-Write (COW) allows both parent and child processes to initially share the same pages in memory
Mutual exclusion means only one process at a time can use a resource
If a system is in safe state then no deadlocks will occur
In the readers-writers problem Readers can only read the dataset and writers can read/write
In Java synchronisation, describe what happens when a thread calls notify() An arbitrary thread T is selected from the wait set, T is moved from the wait set to the entry set, Set the state of T from blocked to runnable
A Mutex is a mutual exclusion lock
A Semaphore, in the OS context, is an integer variable used to solve the critical section problem by using two atomic operations, wait and signal that are used for process synchronization
Preemptive scheduling is used when a process switches from running state to ready state or from the waiting state to ready state
In Round Robin (RR) scheduling Each process gets the same amount of CPU time
In the Many-to-One thread model Many user-level threads mapped to single kernel thread
Signals are used in UNIX/Linux systems to notify a process that a particular event has occurred
A process is a program in execution
Select all the valid states for a process New Running Waiting Ready Paused Terminated
Select the services offered by Operating Systems User Interface Program execution I/O Operations File-system manipulation Communication Error Detection Resource Allocation Logging Protection and Security
All Operating Systems offer a User Interface (UI)
What do all the devices (from a smart watch to a cluster HPC) share in common? Kernel
Linux is a Kernel
Masquerading (breach authentication) refers to Pretending to be an authorised user to escalate privileges
Malware refer to Software designed to exploit, disable, or damage computer
Rings of protection separate functions into domains and order them
An Access matrix is a table that defines access permissions between specific subjects and objects
Type 0 hypervisors are Hardware-based solutions that provide support for virtual machine creation and management via firmware
Paravirtualization is a technique in which the guest operating system is modified to work in cooperation with the Virtual Machine Manager to optimize performance
In the context of cryptography, brute-Force Attack Involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained
The Caesar Cipher Involves replacing each letter of the alphabet with the letter standing N places further down the alphabet
UDP stands for User Datagram Protocol and is an Unreliable data transport protocol
TCP stands for Transmission Control Protocol and is a Reliable data transport protocol
TLS stands for Transport Layer Security
Secure Shell (SSH) is A protocol for secure network communications designed to be relatively simple and inexpensive to implement
A container is an abstraction at the app layer that packages code and dependencies together
Microservices are Highly maintainable and testable Loosely coupled Independently deployable Organized around business capabilities Owned by a small team
Vulnerabilities, in containers, can possibly exist in Container configurations Container packages Application Libraries
Select the steps that help to keep your containers ecosystems secure Check the integrity of the images Sign to validate pipeline phases Consume only trusted content for tagged Docker builds Ensure that the container was generated by a trusted publisher
In the context of Cloud Computing, the properties and characteristics are High scalability and elasticity High availability and reliability High manageability and interoperability High accessibility and portability High performance and optimization
Fault-tolerance is the property that enables a system to continue operating properly in the event of the failure of some of its components
In heterogeneous computing, domain decomposition involves Deciding how data elements should be divided among processors Deciding which tasks each processor should be doing
Why are race conditions so difficult to manage? Programs with race conditions exhibit non-deterministic behaviour Sometimes the result is incorrect Programs work correctly on trivial data sets and small number of threads Errors more likely to occur when number of threads or execution time increases
Edge Computing devices are devices like sensors and machines can be outfitted to work in edge computing
Advantages of Enabling Edge Computing Speed is increased Reliability is increased Random issues are reduced Compliance issues are reduced Hacking issues are reduced
What output is produced by the following? System.out.println("X: " + 25); System.out.println("Y: " + (15 + 50)); System.out.println("Z: " + 300 + 50); X: 25 Y: 65 Z: 30050
Which of the following println statements produces the following output: "Thank you all for coming to my home tonight," he said mysteriously. System.out.println("\"Thank you all for " + "coming to my home tonight,\"\n he said " + "mysteriously.");
How many bits would you need to represent each of the 50 United States using a unique permutation of bits? 6 bits
Which of the following are valid Java identifiers? grade quizGrade NetworkConnection frame2 MAXIMUM MIN_CAPACITY
What is the output of the following code: String var_a="c"; String var_b="c"; if (var_a.equals(var_b)){ System.out.println("A and B have the same value!"); } else{ System.out.println("A and B do not have the same value!"); } A and B have the same value!
What is the output of the following code: for(int i=10;i>-1;--i) { System.out.print((i+1)+" "); } 11 10 9 8 7 6 5 4 3 2 1
What is the output of the following code: for(int i=0;I<=0;I++) { Console.writeline((i+1)+" "); } Not possible to run the code
Created by: Moosie9
Popular Engineering sets

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards