Question: Question 2 0 / 1 . 2 5 points If there are more timer requests than the available number of timer hardware channels, the OS
Question points
If there are more timer requests than the available number of timer hardware channels, the OS resolves this problem by
Question options:
simulating virtual clocks
enabling busy wait
enabling priority level.
using interrupt & polling mechanisms
Hide question feedback
That's not correct
Question points
You are designing a network routing solution and your client really cares about the messages to arrive in order what would be your routing options select all that apply
Question options:
Virtual routing
Fixed routing
Remote routing
Circuit switching
Hide question feedback
Good work
That's not correct
Question points
In a distributed system, a client has a resource that a remote server is trying to access
Question options:
True
False
Hide question feedback
That's not correct
Question points
Operating systems must provide mandatory and advisory filelocking mechanisms
Question options:
True
False
Hide question feedback
That's not correct
Question points
Protocollayer DDoS attack is measured in packet per seconds PPS
Question options:
True
False
Hide question feedback
That's not correct
Question points
When the file is a fixed length of logical records, it allows programs to read and write records rapidly in no particular order.
Question options:
True
False
Hide question feedback
That's not correct
Question points
Access o d read means
Question options:
Domain o has read access to object d
Object o has read access to domain d
Domain d has read access to object o
Object d has read access on domain o
Hide question feedback
That's not correct
Question points
Alice would like to have a very simple directory structure, what would be your recommendation to her?
Question options:
use raw disk structure
use simpletree directory structure
use Unix directory structure
use singlelevel directory structure
Hide question feedback
That's not correct
Question points
OS determines the type of operations performed on a file by using
Question options:
file extension
file path
file lock
file format
Hide question feedback
That's not correct
Question points
Which Access Matrix implementation is more suitable for user's protection
Question options:
Global table
Access lists
Lockkey
Capability list
Hide question feedback
That's not correct
Question points
A potential security violation is called
Question options:
an attack
a threat
a breach
a reconnaissance
Hide question feedback
That's not correct
Question points
A common OS design is to allow IO calls performed via system calls... why?
Question options:
system calls are faster
to enforce sync between CPU & IO controller device
system calls are less erroneous
to enforce IO protection
Hide question feedback
That's not correct
Question points
Device controller Present uniform deviceaccess interface to IO subsystem.
Question options:
True
False
Hide question feedback
That's not correct
Question points
Disk must be subdivided into partitions
Question options:
True
False
Hide question feedback
That's not correct
Question points
OS assigns an address to every IO device
Question options:
True
False
Hide question feedback
That's not correct
Question points
A system where the user is not aware of the multiplicity of the machine is best described as
Question options:
A virtual system Type hypervisor
A Distributedoperating system
A Networkoperating system
A Multicore bases system
Hide question feedback
That's not correct
Question points
A is a collection of nodes containing information about all files
Question options:
partition
directory
metadata
file tree
Hide question feedback
That's not correct
Question points
Which of the following examples represent a domain switching select all that apply
Question options:
When one user logs out and another user logs in aka user change
When a CPU switches from one process to another
When a procedure call is made
When memory swap occurs
Hide question feedback
Good work
That's not correct
Question points
A relative pathname in a tree directory structure begins at the root and follows a path down to the specified file, giving the directory names on the path.
Question options:
True
False
Hide question feedback
That's not correct
Question points
A guest VCPU using binary translation can run instructions natively if it is in
Question options:
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
