Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

S3 - App OS

QuestionAnswer
_______ was used as an early secondary-storage medium, but the access time is much slower than for disks. Magnetic Tape
Modern disks are addressed as large one-dimensional arrays of logical blocks, where the ______ is the smallest unit of transfer. Logical Block
One of the earliest secondary-storage media is the _______. Magnetic Tape
It is a way to read and write data on disks, where the density of bits (bits/unit length) per track is uniform. Constant Linear Velocity
A typical hard disk have a rotation speed from __ 4500 to 7200
A _______ has a separate read-write head for each track. Fixed-head system
The system stores information by recording it ______ on the sector under the read-write head. Magnetically
It is the time it takes for the sector to rotate under the head. Latency time
It provides the bulk of secondary storage for modern computer systems. Magnetic Disk
A ________ movable-head system has only one read-write head per surface and the system moves the head to access a particular track Movable-Head system
The Shortest Seek Time First disk scheduling selects the request with the maximum seek time from the current head position. FALSE
The Shortest Seek Time First disk scheduling selects the request with the minimum seek time from the current head position. TRUE
The OS can improve on the average disk service time by scheduling the requests for disk access. TRUE
LOOK disk scheduling algorithm is sometimes called the elevator algorithm TRUE
The Look disk scheduling selects the request with the minimum seek time from the current head position. FALSE
Compute for the total head movement (THM) of the R/W Head 39, 14, 38, 17. The read write head is positioned at location 10. Compute for the total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using SSTF, how many THM? 29 tracks
Compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. The read write head is positioned at location 32. Total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using C-LOOK ) How many THM? 143 tracks
The disk queue compute for the total head movement (THM) of the R/W Head 39, 14, 38, 17. The read write head is positioned at location 10. The total head movement for a 100 (0 - 99) track disk for each disk scheduling algorithm. Using SCAN. How many THM? 49 tracks
The disk queue compute for the total head movement (THM) of the R/W Head 98, 53, 22, 16, 24. The read write head is positioned at location 32. The total head movement for a 100 track disk for each disk scheduling algorithm. Using SCAN, Tack 98
In a disk the information is recorded on the __ Surface
Since most jobs depend heavily on the disk for loading and input and output files, it is important that disk service be as fast as possible. TRUE
In C-SCAN scheduling, when it reaches the other end, it immediately returns to the beginning of the disk without servicing any requests on the return trip. TRUE
C-SCAN scheduling essentially treats the disk as though it were circular where the last track is adjacent to the first one. TRUE
SCAN disk scheduling algorithm is sometimes called the elevator algorithm TRUE
F6 F6
Which among the given is a vulnerability of a single computer without e-mail or internet? Compressed Passwords
“Sniffers” is a vulnerability of a LAN connected (with internet). FALSE
What is the “Relative risk” of a LAN connected with internet? High
LAN connected (without internet) is vulnerable to “spoofing”. TRUE
Which of the following example strategies does not belong to the key property “Recovery of essential and full services after attack”? Authentication
“Adaptation and evolution to reduce effectiveness of future attacks” is described as_________. Strategies for improving system survivability based on knowledge retrieved from attacks.
Which of the configurations is vulnerable to “Spoofing”? LAN connected with or without Internet
Virus” is a vulnerability of which configuration? All of these (Single Computer (without E-mail or internet, LAN connected with internet, Laptop with E-mail)
“E-mail” is a vulnerability of which configuration? LAN connected (with internet)
What is the “Relative risk” of a LAN connected without internet? Medium
Hoax site is an example of spoofing TRUE
Vishing is similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a website. TRUE
Any breach of security or modification of data that was not the result of a planned intrusion. Unintentional intrusions
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. TRUE
A type of virus which is triggered by a specific time Time Bomb
Hardware malfunction is an example of: Unintentional Intrusion
Which of the given is an example of unintentional attack? Hardware malfunction
These refer to entering systems by guessing authentic passwords. Repeated trials
Which of the given is not an example of unintentional attack? Al of these (Trojan horse , Phishing , Wiretapping)
Refers to the use of discarded materials such as disks, CDs, printout, etc., to enter the system legally. Trash Collection
“Sniffers” is not a vulnerability of a LAN connected (with internet). TRUE
Which among the given is not a vulnerability of a LAN connected with internet? None of the these (LAN connected (without internet) , Single Computer (without E-mail or internet), LAN connected (with internet))
Which of the following example strategies does not belong to the key property “Recover of essential and full services after attack”? All of these Encryption, Intrusion detection, Authentication)
Which of the following example strategies belong to the key property “Adaptation and evolution to reduce effectiveness of future attacks”? Intrusion recognition patterns
It is the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures or accidents System Survivability
Which of the given is considered as system vulnerabilities All of these (Vulnerable firewalls, Email exchange, File downloads)
Infects files on the computer, normally executable files (.exe and .com) commonly found on Microsoft operating systems. File infector virus
__________ are programs that reside on computers attached to the network. None of these (Phishing, Brute force attack, Rootkits)
Spoofing can be applied to emails, phone calls, and websites TRUE
Repeated trials is also known as Brute Force Attack TRUE
File infector virus infects files on your computer. TRUE
A type of virus which is triggered by a certain event like keystroke Logic Bomb
Boot sector virus infects the boot record, the system area of a floppy disk or a hard drive. TRUE
Worm is a program to use to enhance the speed of your computer. FALSE
Windows 10 is an example of hand-held operating system FALSE
Any vulnerability at the _________ level opens the entire system to attack. Operating system
The “Ease of protection” of a LAN connected (with internet) is “Medium”. FALSE
__________ plays a key role in computer system security. Operating System
What is the “ease of protection” of a single computer without e-mail or internet? High
“Recovery of essential and full services after attack” is described as _______. Strategies for limiting damage
“E-mail” is a vulnerability of LAN connected (with internet). TRUE
These refers to an unspecified and undocumented entry point to the system. Trap doors
Ransomware is a malware that demands a fee or ransom. TRUE
Antivirus softwares combat viruses. TRUE
Spear-phishing is variation of phishing In which the phishing sends fake emails to a certain employee of an organization. TRUE
Small programs written to alter the way a computer operates, without permission of the user. Virus
Hoax Sites are used when unauthorized users want to disguise themselves as friendly sites. TRUE
Antivirus software can remove all impurities from your computer. FALSE
Vishing is a type of phishing that involves the use of short messages service (SMS) texting. FALSE
Which of the configurations is vulnerable to “Sniffers”? LAN connected with or without Internet
Which of these are the key properties of a survivable system? All of the above (Recovery of essential services after an attack, Resistance to attacks, Recognition of attacks and resulting damage)
Which of the given is an example strategy of the key property “Recognition of attack and damage”? Intrusion detection
Which among the given is not a vulnerability of a single computer without e-mail or internet? Sniffers
___________ must be on guard to arm their operating systems with all available defense against attack System Administrators
Firewalls are important for security. TRUE
Malicious or not, a breach of security severely damages the system’s credibility TRUE
Sniffers are programs that reside on computer attached to the network TRUE
Ransomware is similar to smishing except that the victims receive a voice mail telling them to call a phone number or access a website. FALSE
Infects data files (such as word processing documents, spreadsheets, etc.) Macro Virus
The “Ease of protection” of a LAN connected (with Internet) is “High”. FALSE
The more complex and powerful the ________, the more likely it is to have vulnerabilities to attack. Operating system
Works by attaching itself to a template (such as NORMAL.DOT), which in turn is attached to word processing documents. Macro Virus
_________ is one in which a malicious hacker takes over computers via the internet and causes them to flood a target site with demands for data and other small tasks causing a computer to perform repeated unproductive task. Denial of Service (DoS) attack
Worm is an example of Blended Threat. TRUE
Which of the given is an example strategy of the key property “Recover of essential and full services after attack”? Contingency planning
Unauthorized user monitors or modifies a user’s transmission. Wire tapping
LAN connected (without internet) is vulnerable to “sniffers”. TRUE
What is the “ease of protection” of a LAN connected without Internet? Medium
Which of the following is an example strategy of the key property “Adaptation and evolution to reduce effectiveness of future attacks”? Intrusion recognition patterns
Security breach can happen due to uneducated users and unauthorized access to system resources TRUE
To be called a virus, one must be self-executing and __________. Self-replicating
Security breach is a gap in system security that can be malicious or not. TRUE
Created by: user-1835460
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards