Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

OS SA3

QuestionAnswer
_______ was used as an early secondary-storage medium, but the access time is much slower than for disks. Magnetic Tape
Which of the given is considered aspects of disk management for which an operating system is responsible. All of these
The system stores information by recording it ______ on the sector under the read-write head. magnetically
Each disk platter has a flat _______ shape, like a phonograoh record. Circular
Since most jobs depend heavily on the disk for loading and input and output files, it is important that disk service be as fast as possible. True
LOOK disk scheduling algorithm is sometimes called the elevator algorithm False
The Shortest Seek Time First disk scheduling selects the request with the minimum seek time from the current head position. True
In a disk the information is recorded on the __ Surface
It is the time it takes for the sector to rotate under the head. Latency Time
A _______ has a separate read-write head for each track. Fixed-head system
It is a way to read and write data on disks, where the number of bits per track is uniform (constant number of sectors). Constant Angular Velocity
The OS can improve on the average disk service time by scheduling the requests for disk access. True
C-SCAN scheduling essentially treats the disk as though it were circular where the last track is adjacent to the first one. True
The First Come First Served disk scheduling selects the request according to the order in the disk queue True
The Shortest Seek Time First disk scheduling selects the request with the maximum seek time from the current head position. False
A disk normally has a device _______ indicating which files are on the disk. directory
______ are rigid metal or glass platters covered with magnetic recording material. Disks
A ________ movable-head system has only one read-write head per surface and the system moves the head to access a particular track Movable-Head system
One of the earliest secondary-storage media is the _______. Magnetic Tape
It is a way to read and write data on disks, where the density of bits (bits/unit length) per track is uniform. Constant Linear Velocity
Given the following track requests in the disk queue compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. Consider that the read write head is positioned at location 32. Compute for the total head movement for a 100 (0 - 99) track 156 tracks
Which of the configurations is vulnerable to “Sniffers”? LAN connected with or without Internet
A type of virus which is triggered by a specific time Time Bomb
Directions: Given the following track requests in the disk queue compute for the total head movement (THM) of the R/W Head 39, 14, 38, 17. Consider that the read write head is positioned at location 10. Compute for the total head movement for a 100 (0 - 9 49 tracks
It is the time it takes for the sector to rotate under the head. Latency time
Small programs written to alter the way a computer operates, without permission of the user. Virus
Spear-phishing is variation of phishing In which the phishier sends fake emails to a certain employee of an organization. True
A typical hard disk have a rotation speed from __ 4500 - 7200
An incident where the head contacts the disk surface, the head will scrape the recording medium off the disk. Head crashes
It is the time it takes to actually transfer data between disk and main memory. Transfer time
Modern disks are addressed as large one-dimensional arrays of logical blocks, where the ______ is the smallest unit of transfer. Logical block
In C-SCAN scheduling, when it reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip. True
The size of a logical block is usually ____ bytes. 512
“Adaptation and evolution to reduce effectiveness of future attacks” is described as_________. Strategies for improving system survivability based on knowledge retrieved from attacks.
Which of the given is an example strategy of the key property “Recover of essential and full services after attack”? contingency planning
The “Ease of protection” of a LAN connected (with Internet) is “High”. False
The “Ease of protection” of a LAN connected (with internet) is “Medium”. False
Which of the given is not an example of unintentional attack? all of these
Logic Bomb is a destructive program that can be triggered by a keystroke or connection with the Internet True
These refer to entering systems by guessing authentic passwords. Repeated trials
Vishing is similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a website. True
Worm is a program to use to enhance the speed of your computer. False
A type of virus which is triggered by a certain event like keystroke Logic Bomb
LAN connected (without internet) is vulnerable to “spoofing” True
Which of the configurations is vulnerable to “Spoofing”? LAN connected with or without Internet
What is the “Relative risk” of a LAN connected without internet? Medium
Which of the given is an example strategy of the key property “Recognition of attack and damage”? intrusion detection
Windows 10 is an example of hand-held operating system False
Security breach can happen due to uneducated users and unauthorized access to system resources True
Blended threats are considered as intentional attacks. True
Which of these are the key properties of a survivable system? All of the above
Computer “Virus” is a vulnerability of Single Computer (without E-mail or internet) True
The more complex and powerful the ________, the more likely it is to have vulnerabilities to attack. operating System
Which of the following example strategies does not belong to the key property “Recovery of essential and full services after attack”? Authentication
What is the “Relative risk” of a LAN connected with internet? High
Hoax Sites are used when unauthorized users want to disguise themselves as friendly sites. True
Infects data files (such as word processing documents, spreadsheets, etc.) Marci Virus
Spoofing can be applied to emails, phone calls, and websites True
Sniffers are programs that reside on computer attached to the network True
Which among the given is not a vulnerability of a single computer without e-mail or internet? Sniffers
What is the “ease of protection” of a single computer without e-mail or internet? High
Security breach is a gap in system security that can be malicious or not. True
Works by attaching itself to a template (such as NORMAL.DOT), which in turn is attached to word processing documents. Macro Virus
__________ are programs that reside on computers attached to the network. none of the these
Small programs written to alter the way a computer operates, without permission of the user. Group of answer choices anti-virus Virus
Created by: kuromisa
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards