Question: The hardware to measure elapsed time and to trigger operations is called _ _ _ _ _ _ Question 1 6 options: PCI bus device

The hardware to measure elapsed time and to trigger operations is called______
Question 16 options:
PCI bus device driver
Virtual crontab
Programmable interval timer
Programmable interval interface
Question 17(1.25 points)
Saved
Access (o, d, read) means
Question 17 options:
Domain o has read access to object d
Object o has read access to domain d
Domain d has read access to object o
Object d has read access on domain o
Question 18(1.25 points)
Saved
________ is a directory structure that allows directories to share subdirectories and/or files
Question 18 options:
Acyclic Graph Directory
Tree-Structure Directory
General Graph Directory
Linear Directory
Question 19(1.25 points)
Saved
Which statement is correct out of the following
Question 19 options:
Fine-grained protection is more complex yet less protective
Rough-grain protection is less complex yet more protective
Rough grain is more protective that fine grain
Fine grain is more protective that rough grain
Question 20(1.25 points)
Saved
Computer peripherals don't use standards OS command; therefore, they rely on _______
Question 20 options:
Directory structure
Device controller
Device driver
Memory management unit, MMU
Question 21(1.25 points)
Saved
Which of the following statement is correct regarding distributed computing
Question 21 options:
Using distributed computing enables computation speedup
A company can balance seasonal traffic spike with system load sharing
Codebase has to exist and persist on every node within a distributed system
Operation managers are able to detect and recover from site failures gracefully without impacting users experience
Question 22(1.25 points)
Saved
Alice would like to have a very simple directory structure, what would be your recommendation to her?
Question 22 options:
use raw disk structure
use simple-tree directory structure
use Unix directory structure
use single-level directory structure
Question 23(1.25 points)
Saved
OS determines the type of operations performed on a file by using
Question 23 options:
file extension
file path
file lock
file format
Question 24(1.25 points)
Saved
_______ is achieved by allowing processes to access data only when they need to for a specific duration of time.
Question 24 options:
Role-base access control
Least privilege principle
Rule-base access control
Need to know principle
Question 25(1.25 points)
Saved
An automated attempt to connect to a range of ports in a network is known as _____
Question 25 options:
nmap scan
nessus scan
brute force
port scanning
Question 26(1.25 points)
Saved
Which Access Matrix implementation is more suitable for user's protection
Question 26 options:
Global table
Access lists
Lock-key
Capability list
Question 27(1.25 points)
Saved
_______ allows several processes to acquire the file concurrently
Question 27 options:
Exclusive lock
Shared lock
Advisory lock
Mandatory lock
Question 28(1.25 points)
Saved
A rights-set in a protection policy is _______
Question 28 options:
A subset of all objects that can be performed by an operation
A set of all domains that can be secured by an object
A subset of all operations that can be performed on the object
A set of all processes that a domain has access/rights to
Question 29(1.25 points)
Saved
Packet switching incurs more overhead per message, but require less setup time
Question 29 options:
True
False
Question 30(1.25 points)
Saved
VMM cycle stealing means ____
Question 30 options:
native OS and guest OS are running on two different cycles
guest OS doesn't receive the CPU cycles they expect
additional binary translation is needed by the VMM
native OS don't receive the CPU cycles they expect
Question 31(1.25 points)
Saved
A potential security violation is called _______
Question 31 options:
an attack
a threat
a breach
a reconnaissance
Question 32(1.25 points)
Saved
________is a program that lets the operating system communicate with specific computer hardware.
Question 32 options:
Device driver
Device controller
Directory structure
Memory management unit, MMU
Question 33(1.25 points)
Saved
Which of the following statements are false about Tree-structure directory (select all that applies)
Question 33 options:
Tree-structure directory allows any given directory within the structure to have only files
Tree-structure directory is rarely used in the enterprise.
Tree-structure directory has a root directory
Both Windows and Linux allow tree-structure directory
answer me all correct options from questions 16 to 33, and send me only correct options

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!