click below
click below
Normal Size Small Size show me how
OS SA3
| Question | Answer |
|---|---|
| _______ was used as an early secondary-storage medium, but the access time is much slower than for disks. | Magnetic Tape |
| Which of the given is considered aspects of disk management for which an operating system is responsible. | All of these |
| The system stores information by recording it ______ on the sector under the read-write head. | magnetically |
| Each disk platter has a flat _______ shape, like a phonograoh record. | Circular |
| Since most jobs depend heavily on the disk for loading and input and output files, it is important that disk service be as fast as possible. | True |
| LOOK disk scheduling algorithm is sometimes called the elevator algorithm | False |
| The Shortest Seek Time First disk scheduling selects the request with the minimum seek time from the current head position. | True |
| In a disk the information is recorded on the __ | Surface |
| It is the time it takes for the sector to rotate under the head. | Latency Time |
| A _______ has a separate read-write head for each track. | Fixed-head system |
| It is a way to read and write data on disks, where the number of bits per track is uniform (constant number of sectors). | Constant Angular Velocity |
| The OS can improve on the average disk service time by scheduling the requests for disk access. | True |
| C-SCAN scheduling essentially treats the disk as though it were circular where the last track is adjacent to the first one. | True |
| The First Come First Served disk scheduling selects the request according to the order in the disk queue | True |
| The Shortest Seek Time First disk scheduling selects the request with the maximum seek time from the current head position. | False |
| A disk normally has a device _______ indicating which files are on the disk. | directory |
| ______ are rigid metal or glass platters covered with magnetic recording material. | Disks |
| A ________ movable-head system has only one read-write head per surface and the system moves the head to access a particular track | Movable-Head system |
| One of the earliest secondary-storage media is the _______. | Magnetic Tape |
| It is a way to read and write data on disks, where the density of bits (bits/unit length) per track is uniform. | Constant Linear Velocity |
| Given the following track requests in the disk queue compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. Consider that the read write head is positioned at location 32. Compute for the total head movement for a 100 (0 - 99) track | 156 tracks |
| Which of the configurations is vulnerable to “Sniffers”? | LAN connected with or without Internet |
| A type of virus which is triggered by a specific time | Time Bomb |
| Directions: Given the following track requests in the disk queue compute for the total head movement (THM) of the R/W Head 39, 14, 38, 17. Consider that the read write head is positioned at location 10. Compute for the total head movement for a 100 (0 - 9 | 49 tracks |
| It is the time it takes for the sector to rotate under the head. | Latency time |
| Small programs written to alter the way a computer operates, without permission of the user. | Virus |
| Spear-phishing is variation of phishing In which the phishier sends fake emails to a certain employee of an organization. | True |
| A typical hard disk have a rotation speed from __ | 4500 - 7200 |
| An incident where the head contacts the disk surface, the head will scrape the recording medium off the disk. | Head crashes |
| It is the time it takes to actually transfer data between disk and main memory. | Transfer time |
| Modern disks are addressed as large one-dimensional arrays of logical blocks, where the ______ is the smallest unit of transfer. | Logical block |
| In C-SCAN scheduling, when it reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip. | True |
| The size of a logical block is usually ____ bytes. | 512 |
| “Adaptation and evolution to reduce effectiveness of future attacks” is described as_________. | Strategies for improving system survivability based on knowledge retrieved from attacks. |
| Which of the given is an example strategy of the key property “Recover of essential and full services after attack”? | contingency planning |
| The “Ease of protection” of a LAN connected (with Internet) is “High”. | False |
| The “Ease of protection” of a LAN connected (with internet) is “Medium”. | False |
| Which of the given is not an example of unintentional attack? | all of these |
| Logic Bomb is a destructive program that can be triggered by a keystroke or connection with the Internet | True |
| These refer to entering systems by guessing authentic passwords. | Repeated trials |
| Vishing is similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a website. | True |
| Worm is a program to use to enhance the speed of your computer. | False |
| A type of virus which is triggered by a certain event like keystroke | Logic Bomb |
| LAN connected (without internet) is vulnerable to “spoofing” | True |
| Which of the configurations is vulnerable to “Spoofing”? | LAN connected with or without Internet |
| What is the “Relative risk” of a LAN connected without internet? | Medium |
| Which of the given is an example strategy of the key property “Recognition of attack and damage”? | intrusion detection |
| Windows 10 is an example of hand-held operating system | False |
| Security breach can happen due to uneducated users and unauthorized access to system resources | True |
| Blended threats are considered as intentional attacks. | True |
| Which of these are the key properties of a survivable system? | All of the above |
| Computer “Virus” is a vulnerability of Single Computer (without E-mail or internet) | True |
| The more complex and powerful the ________, the more likely it is to have vulnerabilities to attack. | operating System |
| Which of the following example strategies does not belong to the key property “Recovery of essential and full services after attack”? | Authentication |
| What is the “Relative risk” of a LAN connected with internet? | High |
| Hoax Sites are used when unauthorized users want to disguise themselves as friendly sites. | True |
| Infects data files (such as word processing documents, spreadsheets, etc.) | Marci Virus |
| Spoofing can be applied to emails, phone calls, and websites | True |
| Sniffers are programs that reside on computer attached to the network | True |
| Which among the given is not a vulnerability of a single computer without e-mail or internet? | Sniffers |
| What is the “ease of protection” of a single computer without e-mail or internet? | High |
| Security breach is a gap in system security that can be malicious or not. | True |
| Works by attaching itself to a template (such as NORMAL.DOT), which in turn is attached to word processing documents. | Macro Virus |
| __________ are programs that reside on computers attached to the network. | none of the these |
| Small programs written to alter the way a computer operates, without permission of the user. Group of answer choices anti-virus | Virus |