click below
click below
Normal Size Small Size show me how
SS
Question | Answer |
---|---|
The logical address is | generated by the CPU |
Memory Management Unit (MMU) is a | hardware device that at run time maps virtual to physical address |
Virtual Memory is | separation of user logical memory from physical memory |
Copy-on-Write (COW) allows | both parent and child processes to initially share the same pages in memory |
Mutual exclusion means | only one process at a time can use a resource |
If a system is in safe state then | no deadlocks will occur |
In the readers-writers problem | Readers can only read the dataset and writers can read/write |
In Java synchronisation, describe what happens when a thread calls notify() | An arbitrary thread T is selected from the wait set, T is moved from the wait set to the entry set, Set the state of T from blocked to runnable |
A Mutex is a | mutual exclusion lock |
A Semaphore, in the OS context, is | an integer variable used to solve the critical section problem by using two atomic operations, wait and signal that are used for process synchronization |
Preemptive scheduling is used when a process | switches from running state to ready state or from the waiting state to ready state |
In Round Robin (RR) scheduling | Each process gets the same amount of CPU time |
In the Many-to-One thread model | Many user-level threads mapped to single kernel thread |
Signals are used in UNIX/Linux systems to notify | a process that a particular event has occurred |
A process is | a program in execution |
Select all the valid states for a process | New Running Waiting Ready Paused Terminated |
Select the services offered by Operating Systems | User Interface Program execution I/O Operations File-system manipulation Communication Error Detection Resource Allocation Logging Protection and Security |
All Operating Systems offer | a User Interface (UI) |
What do all the devices (from a smart watch to a cluster HPC) share in common? | Kernel |
Linux is | a Kernel |
Masquerading (breach authentication) refers to | Pretending to be an authorised user to escalate privileges |
Malware refer to | Software designed to exploit, disable, or damage computer |
Rings of protection | separate functions into domains and order them |
An Access matrix | is a table that defines access permissions between specific subjects and objects |
Type 0 hypervisors are | Hardware-based solutions that provide support for virtual machine creation and management via firmware |
Paravirtualization | is a technique in which the guest operating system is modified to work in cooperation with the Virtual Machine Manager to optimize performance |
In the context of cryptography, brute-Force Attack | Involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained |
The Caesar Cipher | Involves replacing each letter of the alphabet with the letter standing N places further down the alphabet |
UDP stands for | User Datagram Protocol and is an Unreliable data transport protocol |
TCP stands for | Transmission Control Protocol and is a Reliable data transport protocol |
TLS stands for | Transport Layer Security |
Secure Shell (SSH) is | A protocol for secure network communications designed to be relatively simple and inexpensive to implement |
A container is | an abstraction at the app layer that packages code and dependencies together |
Microservices are | Highly maintainable and testable Loosely coupled Independently deployable Organized around business capabilities Owned by a small team |
Vulnerabilities, in containers, can possibly exist in | Container configurations Container packages Application Libraries |
Select the steps that help to keep your containers ecosystems secure | Check the integrity of the images Sign to validate pipeline phases Consume only trusted content for tagged Docker builds Ensure that the container was generated by a trusted publisher |
In the context of Cloud Computing, the properties and characteristics are | High scalability and elasticity High availability and reliability High manageability and interoperability High accessibility and portability High performance and optimization |
Fault-tolerance is | the property that enables a system to continue operating properly in the event of the failure of some of its components |
In heterogeneous computing, domain decomposition involves | Deciding how data elements should be divided among processors Deciding which tasks each processor should be doing |
Why are race conditions so difficult to manage? | Programs with race conditions exhibit non-deterministic behaviour Sometimes the result is incorrect Programs work correctly on trivial data sets and small number of threads Errors more likely to occur when number of threads or execution time increases |
Edge Computing devices are | devices like sensors and machines can be outfitted to work in edge computing |
Advantages of Enabling Edge Computing | Speed is increased Reliability is increased Random issues are reduced Compliance issues are reduced Hacking issues are reduced |
What output is produced by the following? System.out.println("X: " + 25); System.out.println("Y: " + (15 + 50)); System.out.println("Z: " + 300 + 50); | X: 25 Y: 65 Z: 30050 |
Which of the following println statements produces the following output: "Thank you all for coming to my home tonight," he said mysteriously. | System.out.println("\"Thank you all for " + "coming to my home tonight,\"\n he said " + "mysteriously."); |
How many bits would you need to represent each of the 50 United States using a unique permutation of bits? | 6 bits |
Which of the following are valid Java identifiers? | grade quizGrade NetworkConnection frame2 MAXIMUM MIN_CAPACITY |
What is the output of the following code: String var_a="c"; String var_b="c"; if (var_a.equals(var_b)){ System.out.println("A and B have the same value!"); } else{ System.out.println("A and B do not have the same value!"); } | A and B have the same value! |
What is the output of the following code: for(int i=10;i>-1;--i) { System.out.print((i+1)+" "); } | 11 10 9 8 7 6 5 4 3 2 1 |
What is the output of the following code: for(int i=0;I<=0;I++) { Console.writeline((i+1)+" "); } | Not possible to run the code |