Question: Question 2 0 / 1 . 2 5 points If there are more timer requests than the available number of timer hardware channels, the OS

Question 20/1.25 points
If there are more timer requests than the available number of timer hardware channels, the OS resolves this problem by_______
Question options:
simulating virtual clocks
enabling busy wait
enabling priority level.
using interrupt & polling mechanisms
Hide question 2 feedback
That's not correct
Question 30/1.25 points
You are designing a network routing solution and your client really cares about the messages to arrive in order what would be your routing options (select all that apply)
Question options:
Virtual routing
Fixed routing
Remote routing
Circuit switching
Hide question 3 feedback
Good work
That's not correct
Question 50/1.25 points
In a distributed system, a client has a resource that a remote server is trying to access
Question options:
True
False
Hide question 5 feedback
That's not correct
Question 100/1.25 points
Operating systems must provide mandatory and advisory file-locking mechanisms
Question options:
True
False
Hide question 10 feedback
That's not correct
Question 120/1.25 points
Protocol-layer DDoS attack is measured in packet per seconds (PPS)
Question options:
True
False
Hide question 12 feedback
That's not correct
Question 150/1.25 points
When the file is a fixed length of logical records, it allows programs to read and write records rapidly in no particular order.
Question options:
True
False
Hide question 15 feedback
That's not correct
Question 170/1.25 points
Access (o, d, read) means
Question options:
Domain o has read access to object d
Object o has read access to domain d
Domain d has read access to object o
Object d has read access on domain o
Hide question 17 feedback
That's not correct
Question 220/1.25 points
Alice would like to have a very simple directory structure, what would be your recommendation to her?
Question options:
use raw disk structure
use simple-tree directory structure
use Unix directory structure
use single-level directory structure
Hide question 22 feedback
That's not correct
Question 230/1.25 points
OS determines the type of operations performed on a file by using
Question options:
file extension
file path
file lock
file format
Hide question 23 feedback
That's not correct
Question 260/1.25 points
Which Access Matrix implementation is more suitable for user's protection
Question options:
Global table
Access lists
Lock-key
Capability list
Hide question 26 feedback
That's not correct
Question 310/1.25 points
A potential security violation is called _______
Question options:
an attack
a threat
a breach
a reconnaissance
Hide question 31 feedback
That's not correct
Question 370/1.25 points
A common OS design is to allow I/O calls performed via system calls... why?
Question options:
system calls are faster
to enforce sync between CPU & I/O controller device
system calls are less erroneous
to enforce I/O protection
Hide question 37 feedback
That's not correct
Question 380/1.25 points
Device controller Present uniform device-access interface to I/O subsystem.
Question options:
True
False
Hide question 38 feedback
That's not correct
Question 460/1.25 points
Disk must be subdivided into partitions
Question options:
True
False
Hide question 46 feedback
That's not correct
Question 470/1.25 points
OS assigns an address to every I/O device
Question options:
True
False
Hide question 47 feedback
That's not correct
Question 510/1.25 points
A system where the user is not aware of the multiplicity of the machine is best described as _____
Question options:
A virtual system Type2 hypervisor
A Distributed-operating system
A Network-operating system
A Multicore bases system
Hide question 51 feedback
That's not correct
Question 530/1.25 points
A ________ is a collection of nodes containing information about all files
Question options:
partition
directory
metadata
file tree
Hide question 53 feedback
That's not correct
Question 540/1.25 points
Which of the following examples represent a domain switching (select all that apply)
Question options:
When one user logs out and another user logs in (aka user change)
When a CPU switches from one process to another
When a procedure call is made
When memory swap occurs
Hide question 54 feedback
Good work
That's not correct
Question 570/1.25 points
A relative pathname in a tree directory structure begins at the root and follows a path down to the specified file, giving the directory names on the path.
Question options:
True
False
Hide question 57 feedback
That's not correct
Question 630/1.25 points
A guest VCPU using binary translation can run instructions natively if it is in______
Question options:

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!